in ,

The Early History of Usenet, Hacker News


Apple

24 August 2007:Defending Against the Owner

(March) :Privacy: Little Brother

(February) :Goto Fail

(September) :The U2 Incident

(May) :Who Pays?

2 May (**********************************************************************************************************************************************************************************************************************************************************************************************:Eran Tromer’s Attack on Ray Ozzie’s CLEAR Protocol

bibliographies

7 March (**********************************************************************************************************************************************************************************************************************************************************************************************:Please Embed Bibliographic Data in Online Documents

Bruce Schneier

7 July (*************************************************************************************************************************************************************************************************************************************************************************************************:Keys under the Doormat

(July) :Posting PDFs

(CIA)

(July) :Insider Attacks

(July) :What Spies Do

8 August (**********************************************************************************************************************************************************************************************************************************************************************************************: (Foldering)

copyright

3 September 2008 :This Blog and Creative Commons

(September) :Skype’s EULA

1 April (*************************************************************************************************************************************************************************************************************************************************************************************************:ISPs to Enforce Copyright Law

cryptography

22 April 2014:Doing Crypto

5 February (*************************************************************************************************************************************************************************************************************************************************************************************************:The Uses and Abuses of Cryptography

7 July (*************************************************************************************************************************************************************************************************************************************************************************************************:Keys under the Doormat

(December) :Cryptography is Hard

3 January (************************************************************************************************************************************************************************************************************************************************************************************************:Why More Effort Won’t Solve the Exceptional Access Problem

8 April (************************************************************************************************************************************************************************************************************************************************************************************************:Problems with the Burr-Feinstein Bill

(October) :Historical Loop

2 May (**********************************************************************************************************************************************************************************************************************************************************************************************:Eran Tromer’s Attack on Ray Ozzie’s CLEAR Protocol

7 October 2019:The Crypto Wars Resume

exceptional access

7 July (*************************************************************************************************************************************************************************************************************************************************************************************************:Keys under the Doormat

3 January (************************************************************************************************************************************************************************************************************************************************************************************************:Why More Effort Won’t Solve the Exceptional Access Problem

8 April (************************************************************************************************************************************************************************************************************************************************************************************************:Problems with the Burr-Feinstein Bill

2 May (**********************************************************************************************************************************************************************************************************************************************************************************************:Eran Tromer’s Attack on Ray Ozzie’s CLEAR Protocol

7 October 2019:The Crypto Wars Resume

Facebook

5 December 2007:Facebook Apologizes

16 August 2010:A Facebook Privacy Study

2 June (*************************************************************************************************************************************************************************************************************************************************************************************************: (Facebook and PGP) *****

4 May (**********************************************************************************************************************************************************************************************************************************************************************************************:Facebook’s New Dating App

FTC

(June) :Password Leaks

(August) :I’m Back …

9 November (**********************************************************************************************************************************************************************************************************************************************************************************************:Protecting Privacy Differently

Google

(January) : (More on YouTube, the Government, and Privacy)

2 March 2011:Doing History

2 June (*************************************************************************************************************************************************************************************************************************************************************************************************: (Facebook and PGP) *****

(May) :Who Pays?

4 January (**********************************************************************************************************************************************************************************************************************************************************************************************:Meltdown and Specter: Security is a Systems Property

8 August (**********************************************************************************************************************************************************************************************************************************************************************************************: (Foldering)

history

9 January 2009:A Telegraph-Era TLD?

2 March 2011:Doing History

(November) :Rewriting History

6 June 2014:The Battle of Midway

(October) :Historical Loop

(legal)

(January) : (More on YouTube, the Government, and Privacy)

(September) :Skype’s EULA

6 December (***************************************************************************************************************************************************************************************************************************************************************************************************:Alternate Universes: Academic Publishing in Computer Science vs. Law

Matt Blaze

(February) :A Technical Mistake

7 July (*************************************************************************************************************************************************************************************************************************************************************************************************:Keys under the Doormat

7 August (**********************************************************************************************************************************************************************************************************************************************************************************************:The Economics of Hacking an Election

Meltdown

4 January (**********************************************************************************************************************************************************************************************************************************************************************************************:Meltdown and Specter: Security is a Systems Property

ML

4 May (**********************************************************************************************************************************************************************************************************************************************************************************************:Facebook’s New Dating App

NSA

2 March 2011:Doing History

(August) :I’m Back …

(February) :Goto Fail

(July) :What Spies Do

(February) :What Must We Trust?

2 June (*************************************************************************************************************************************************************************************************************************************************************************************************: (Facebook and PGP) *****

(July) :Posting PDFs

Orin Kerr

8 April (************************************************************************************************************************************************************************************************************************************************************************************************:Problems with the Burr-Feinstein Bill

(patching) ******

(April) : (The Open Source Quality Challenge)

2 October 2011:The Untrusted Path

(January) :Types of Attack

5 February 2012: (The FBI and Scotland Yard versus Anonymous: Security Lessons)

(June) :Fixing Holes

(May) :Who Pays?

PGP

2 June (*************************************************************************************************************************************************************************************************************************************************************************************************: (Facebook and PGP) *****

privacy

3 July 2007:Beer and Privacy

5 December 2007:Facebook Apologizes

(March) :Threat Models

(January) : (More on YouTube, the Government, and Privacy)

16 August 2010:A Facebook Privacy Study

28 March 2011:I’ve Gone Encrypted

6 July (***************************************************************************************************************************************************************************************************************************************************************************************************:I Will Be Speaking at the Privacy and Civil Liberties Oversight Board Workshop

(September) :The U2 Incident

(September) :Update on Equifax

4 May (**********************************************************************************************************************************************************************************************************************************************************************************************:Facebook’s New Dating App

9 November (**********************************************************************************************************************************************************************************************************************************************************************************************:Protecting Privacy Differently

reliability

20 August 2007:The Skype Outage

(December) : (Another Cluster of Cable Cuts)

(April) : (The Open Source Quality Challenge)

security

(July) :Insider Attacks

(January) :Hacking Trains

(January) : (Massive Computer-Assisted Fraud)

(February) :Teach a Man to Phish

(March) :Threat Models

(April) : (The Open Source Quality Challenge)

28 March 2011:I’ve Gone Encrypted

28 May 2011:RSA Breach Fallout?

2 October 2011:The Untrusted Path

(January) :Types of Attack

5 February 2012: (The FBI and Scotland Yard versus Anonymous: Security Lessons)

1 June 2012:Flame On!

(June) :Password Leaks

(June) :Fixing Holes

(February) :Goto Fail

22 April 2014:Doing Crypto

(February) :What Must We Trust?

(May) :Who Pays?

(September) :Update on Equifax

4 January (**********************************************************************************************************************************************************************************************************************************************************************************************:Meltdown and Specter: Security is a Systems Property

(July) :Posting PDFs

8 August (**********************************************************************************************************************************************************************************************************************************************************************************************: (Foldering)

Specter

4 January (**********************************************************************************************************************************************************************************************************************************************************************************************:Meltdown and Specter: Security is a Systems Property

Susan Landau

7 July (*************************************************************************************************************************************************************************************************************************************************************************************************:Keys under the Doormat

systems properties

4 January (**********************************************************************************************************************************************************************************************************************************************************************************************:Meltdown and Specter: Security is a Systems Property

voting

5 November 2008 :Working the Polls

7 August (**********************************************************************************************************************************************************************************************************************************************************************************************:The Economics of Hacking an Election

6 September (**********************************************************************************************************************************************************************************************************************************************************************************************:The National Academies Report “The Future of Voting”

Washington

(June) :Fixing Holes

6 July (***************************************************************************************************************************************************************************************************************************************************************************************************:I Will Be Speaking at the Privacy and Civil Liberties Oversight Board Workshop

(August) :I’m Back …

7 July (*************************************************************************************************************************************************************************************************************************************************************************************************:Keys under the Doormat

1 February (************************************************************************************************************************************************************************************************************************************************************************************************:Caveats About “Computer Science For All”

8 April (************************************************************************************************************************************************************************************************************************************************************************************************:Problems with the Burr-Feinstein Bill

Brave Browser
Read More
Payeer

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

The Power of Shower Thoughts: Trusting Your Mind to Work in the Background, Hacker News

This chatbot wants to solve America’s broken sexual education system, Recode

This chatbot wants to solve America’s broken sexual education system, Recode