In a recent blog post, I laid out the argument that, if you have securely implemented end-to-end encryption in your software, then the jurisdiction where your ciphertext is stored is almost irrelev…| Dhole Moments
I’ve always wanted to write a technical followup to an earlier post, Toward Better Master Passwords, but this time going into some of the math behind it.| 1Password Blog
Abstract| drops.dagstuhl.de
Information Security Research & Education, University College London (UCL)| Bentham’s Gaze
For years, the world of cryptocurrency has been synonymous with cutting-edge digital security and the constant threat of sophisticated cyberattacks. The community has honed its skills in protecting its assets from malware, fraudsters, and cybercriminals. But what if the biggest threat to your crypto| Bentham’s Gaze
COLDCARD Is The Most Trusted and Secure Bitcoin Signing Device (aka. Bitcoin Hardware Wallet)| coldcard.com
In mid-April | ongoing by Tim Bray
Rethinking the Threat Model for US Cloud Providers due to Trump| https://www.chrisfarris.com/
How do you make sure a $5 wrench attack remains just a meme and not your reality?| Casa Blog
In the latest installment of “People Are Bad at Security,” reporters from the Australian Broadcasting Corporation use a heatmap to illustrate the prevalence of 29 million PINs from the Have I Been Pwned? database.| TidBITS
Trump horrifies even some of his crypto-steeped fans by launching a memecoin before his inauguration, and a flurry of activity from the new administration signals what’s in store for the crypto world in the next four years.| Citation Needed
This is a continuation of my previous post about upgrading personal security. This post focuses on preventing evil maid attacks using disk encryption and secure boot. With this post, I compiled and summarized all of the resources I used to do all of this configuration. The hope is that having a set of steps in one place reduces the need to go hunting across different Reddit posts, blog posts, and wiki articles as I did.| saligrama.io
A Hacker's Blog of Unintended Use and Insomnia.| The Hacker Blog
Previously: security engineer at Square, co-author of HackLang, put the 's' in https at Facebook. Maker of CTFs.| www.quaxio.com
Blockchains combine ideas from cryptography, distributed systems, economics, & politics. This full context is required for correctly valuing blockchains and ICOs.| Unchained
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.| Seirdy’s Home
plausibly deniable encryption| spacetime.dev