-
As part of a security conference organized by Hewlett Packard, the former NSA Director sat down yesterday for a moderated discussion with the journalist and co-founder of the Intercept.
Here's the vid...
-
The D.C. Circuit has spoken in Obama v. Klayman—the constitutional challenge to the just-winding-down bulk metadata program—and it has announced its refusal to speak on the subject.
-
On Friday, the Foreign Intelligence Surveillance Court authorized the extension of the NSA's collection of bulk telephony metadata under Section 215 of the USA Patriot Act until November 29th, 2015—the l...
-
Benjamin Wittes recently asked "Is It Really Technically Impossible?" to build backdoors into security systems.
-
Quantum computing is a novel way to build computers -- one that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers. In...
-
This one has been puzzling me for several days. Since I have not yet been able to figure it out, I thought I would "bleg" for assistance from our encryption-savvy readership. According to the Sun Senti...
-
Over the past few weeks, I have been up to my neck in encryption.
-
What follows is a guest post from Nicholas Weaver, a computer security researcher at the International Computer Science Institute in Berkeley:
Properly configured, an iOS device is perhaps the most sec...
-
It isn't every day you have an exchange with a journalist who just comes out and admits—twice, actually—that a story in his publication contains made up facts.
-
We expected our piece on liability standards with respect to encryption would provoke strong reactions. We did not expect ad hominim attacks, outright lies, or a near-total failure to engage our legal an...
-
In the first part of this series, we looked at the question of whether Apple could be held liable in a negligence tort for refusing to retain the ability to provide law enforcement with decrypted communi...
-
According to the Office of the Director of National Intelligence, the National Security Agency will no longer access the historical metadata collected under Section 215 after the 180-day transition perio...