Overview of Apple's Client-side CSAM Scanning| educatedguesswork.org
You go to war with the algorithms you have, not the ones you wish you had| educatedguesswork.org
Understanding The Web Security Model, Part II: Web Applications| educatedguesswork.org
DNS Security, Part VI: Blockchain-based Name Systems| educatedguesswork.org
DNS Security, Part I: Basic DNS| educatedguesswork.org
It's a miracle anything works at all| educatedguesswork.org
Out of the crooked timber of IP no straight thing was ever made| educatedguesswork.org
More than you wanted to know about the eIDAS proposal to regulate how browsers treat certificates| educatedguesswork.org
A field guide to VPNs, proxies, and traffic relaying| educatedguesswork.org
End-to-End Encryption and Messaging Interoperability| educatedguesswork.org
You really shouldn't have to trust the network you're on, but you kind of do| educatedguesswork.org
New phone, who dis?| educatedguesswork.org
Understanding The Web Security Model (Outtake): Cookies and Behavioral Advertising| educatedguesswork.org
Privacy Preserving Measurement 3: Prio| educatedguesswork.org
DNS Security, Part IV: Transport security for DNS (DoT, DoH, DoQ)| educatedguesswork.org