-
This week, the UN General Assembly considered a resolution mandating the creation of a Group of Governmental Experts (GGE) for 2016-2017. The GGE will study existing and potential threats in the sphere o...
-
Technologists don't oppose cryptographic backdoors based on some vague allegiance to civil liberties. We oppose them because we've been burned before. Backdoors fail, often quite badly. And the community...
-
This is the second post in a series analyzing the Daskal-Woods reform proposal for law enforcement demands for communications content across national borders. In the first post, I examined how the propo...
-
Satoshi Nakamoto exposed? As most readers know, Bitcoin is a crypto currency that was first invented by a pseudononymous mathematician who went by the name of Satoshi Nakamoto. For years, many has soug...
-
The President addressed the nation tonight in an effort to explain our strategy against ISIL, to specify some steps he would like Congress to take, and to underscore some things he thinks we should not d...
-
When the U.S. and China reached an agreement in late September not to engage in commercially motivated cyber espionage it was viewed as a significant step forward in cybersecurity relations between the t...
-
The contours of the present encryption debate are well known. Especially in the wake of the Paris shootings, law enforcement and national security (LE/NS) officials are worried that terrorist use of enc...
-
Buried in this morning's article covering the ongoing U.S.-China cybersecurity talks, Chinese state-owned media outlet Xinhua News said that an investigation had determined that the hack of the Office of...
-
A few weeks ago, I took note of the comments of China-cybersecurity expert James Lewis to the effect that those much-derided US indictments of PLA hackers had actually had a big impact of Chinese cyber-s...
-
I have an op-ed in tomorrow’s New York Times explaining why I think we’re at a critical moment in the regulation of the global Internet. States are increasingly asserting territorial control over the In...
-
Today's fascinating piece by Matthew Waxman and Doron Hindin, "How Does Israel Regulate Encryption?," raises a number of questions in my mind, two of which I put out to readers by way of soliciting infor...
-
Recent terrorist attacks and resulting questions about the limits of surveillance have rekindled debate about how governments should deal with the challenges of powerful, commercially available encryptio...