-
Just over a week ago, at the BlackHat hacker convention in Las Vegas, Ivan Krstić, Head of Security Engineering and Architecture at Apple gave a talk entitled “Behind the scenes of iOS Security,” the sli...
-
Amid an onslaught of privacy and cybersecurity threats, it can be difficult to predict which potential concerns will capture the public imagination. A particularly unlikely candidate for public debate ov...
-
The encryption debate seems to have died down for now. But events have a way of intruding. As the Hill reports: "Researchers who uncovered a security key that protects Windows devices as they boot up s...
-
Editor's Note: This article has been updated to more accurately reflect the circumstances under which a defense intelligence component may collect U.S. personal information inside the United States.
-
In May 2014, the Court of Justice of the European Union (CJEU) ruled that search engine operators in the EU are responsible for handling individuals’ requests to remove links to personal information that...
-
Editor’s note: This post also appears on Just Security.
-
As a matter of established legal precedent, the police can compel someone to provide their fingerprint onto a fingerprint reader. Equally well-established is that exigent circumstances—including "the nee...
-
Yesterday, the Second Circuit Court of Appeals ruled against the United States Government in the case Microsoft v. United States, stating that the government cannot compel Microsoft, or other companies, ...
-
Yesterday, the Second Circuit released its long-awaited opinion in the Microsoft Ireland case, ruling that the DOJ cannot compel Microsoft to produce emails stored on its Irish servers, because to do so ...
-
The Second Circuit Court of Appeals ruled today in the case Microsoft v. United States, finding that Stored Communications Act "does not authorize courts to issue and enforce against U.S.-based service p...
-
National Security Council veterans Ari Schwartz and Rob Knake recently released a paper entitled Government’s Role in Vulnerability Disclosure. The paper, published by Harvard’s Belfer Center, catalogues...
-
The Indian Supreme Court has dismissed a public interest litigation petition (PIL) by Sudhir Yadav, a Right-To-Information activist and web developer who called for a ban on messaging apps that offer end...