16 May 2017: Who Pays?

12 May 2017: Patching is Hard

28 March 2016: The FBI and the iPhone: Important Unanswered Questions

19 February 2015: Hiding in the Firmware?

22 July 2014: What Should PGP Look Like?

23 January 2008: Apple Adds the Missing Applications to the iPod Touch

16 October 2007: The Proper Benefit of an iPhone Design Mistake

10 September 2007: What's Missing in the iPod Touch

24 August 2007: Defending Against the Owner

23 July 2007: Security Flaw in the iPhone

7 March 2018: Please Embed Bibliographic Data in Online Documents

7 July 2015: Keys under the Doormat

12 September 2019: What is a Security Mechanism?

19 December 2014: Did the DPRK Hack Sony?

20 July 2014: What Spies Do

26 September 2009: The Problem of Computerized Search

18 January 2008: The CIA Blames Hackers for Power Outages

15 July 2010: How DRM Can Hurt Sales

8 March 2009: Access to Old Information

3 September 2008: This Blog and Creative Commons

29 July 2008: Control as a Motive for Content Owners

17 June 2008: The Associated Press and Fair Use

24 August 2018: German Cryptanalytic Attacks on the British World War II "TYPEX" Machine

16 October 2017: Another Thought About KRACK

16 October 2017: Two More Crypto Holes

8 April 2016: Problems with the Burr-Feinstein Bill

3 January 2016: Why More Effort Won't Solve the Exceptional Access Problem

7 July 2015: Keys under the Doormat

5 February 2015: The Uses and Abuses of Cryptography

22 July 2014: What Should PGP Look Like?

21 May 2013: The Oldest Algorithmic Patent?

19 February 2015: Hiding in the Firmware?

16 February 2015: What Must We Trust?

19 December 2014: Did the DPRK Hack Sony?

21 October 2011: The Sins of the Flash

16 October 2010: The Worm and the Wiretap

13 March 2018: Ed Felten to be Named as a PCLOB Board Member

4 April 2008: Buggy Voting Systems in New Jersey

8 April 2016: Problems with the Burr-Feinstein Bill

28 March 2016: The FBI and the iPhone: Important Unanswered Questions

3 January 2016: Why More Effort Won't Solve the Exceptional Access Problem

7 July 2015: Keys under the Doormat

16 October 2010: The Worm and the Wiretap

4 May 2018: Facebook's New Dating App

12 May 2017: Patching is Hard

28 April 2012: The Dangers of Asking for Social Network Passwords

18 July 2011: Will the Circle Be Unbroken?

29 July 2008: Control as a Motive for Content Owners

22 October 2007: More on Comcast Blocking Peer-to-Peer Traffic

15 July 2020: Hot Take on the Twitter Hack

28 December 2011: Weird Idea of the Day -- Analysis

4 January 2018: Meltdown and Spectre: Security is a Systems Property

16 May 2017: Who Pays?

12 May 2017: Patching is Hard

28 April 2012: The Dangers of Asking for Social Network Passwords

18 July 2011: Will the Circle Be Unbroken?

8 March 2009: Access to Old Information

2 March 2009: The White House Removes Videos from YouTube

24 November 2008: Will Google Need a Bailout Some Day?

24 August 2018: German Cryptanalytic Attacks on the British World War II "TYPEX" Machine

6 June 2014: The Battle of Midway

21 May 2013: The Oldest Algorithmic Patent?

8 March 2009: Access to Old Information

4 June 2014: Machine Learning and the Fourth Amendment

3 November 2009: The Role of a Cybersecurity Czar

26 September 2009: The Problem of Computerized Search

12 April 2009: The Cybersecurity Act of 2009

2 March 2009: The White House Removes Videos from YouTube

28 February 2009: Computer Processing and the Law

4 February 2009: More on Access to Alcohol Breath Tester Source Code

10 July 2008: FISA and Border Searches of Laptops

17 June 2008: The Associated Press and Fair Use

27 January 2008: The Dangers of the Protect America Act

20 July 2007: Secondary Uses and Privacy

7 July 2007: Pen Registers and the Internet

19 June 2007: The Court of Appeals and Email Privacy

7 August 2018: The Economics of Hacking an Election

14 May 2018: The Security Problem with HTML Email

7 July 2015: Keys under the Doormat

27 January 2008: The Dangers of the Protect America Act

29 August 2007: The FBI and Computer Security (Updated)

4 January 2018: Meltdown and Spectre: Security is a Systems Property

4 May 2018: Facebook's New Dating App

19 February 2015: Hiding in the Firmware?

16 February 2015: What Must We Trust?

19 December 2014: Did the DPRK Hack Sony?

22 July 2014: What Should PGP Look Like?

20 July 2014: What Spies Do

21 October 2011: The Sins of the Flash

16 October 2010: The Worm and the Wiretap

10 July 2008: FISA and Border Searches of Laptops

4 February 2008: Underwater Fiber Cuts in the Middle East

12 September 2019: What is a Security Mechanism?

8 April 2016: Problems with the Burr-Feinstein Bill

13 January 2015: Software Insecurity: The Problem with the White House Cybersecurity Proposals

4 June 2014: Machine Learning and the Fourth Amendment

10 July 2008: FISA and Border Searches of Laptops

28 April 2012: The Dangers of Asking for Social Network Passwords

16 October 2017: Two More Crypto Holes

16 September 2017: Preliminary Thoughts on The Equifax Hack

16 May 2017: Who Pays?

12 May 2017: Patching is Hard

28 March 2016: The FBI and the iPhone: Important Unanswered Questions

5 February 2012: The FBI and Scotland Yard versus Anonymous: Security Lessons

24 July 2008: Cybersecurity Advice for (Possible) President Obama

13 March 2018: Ed Felten to be Named as a PCLOB Board Member

22 July 2014: What Should PGP Look Like?

26 April 2020: The Price of Lack of Clarity

4 May 2018: Facebook's New Dating App

5 October 2017: Replacing Social Security Numbers Is Harder Than You Think

20 September 2017: Yet Another Update on Equifax

16 September 2017: Preliminary Thoughts on The Equifax Hack

4 June 2014: Machine Learning and the Fourth Amendment

6 July 2013: I Will Be Speaking at the Privacy and Civil Liberties Oversight Board Workshop

11 July 2010: Comments on the National Strategy for Trusted Identities in Cyberspace

2 March 2009: The White House Removes Videos from YouTube

10 July 2008: FISA and Border Searches of Laptops

6 December 2007: More Tracking Mania: PDFs with Ads

20 July 2007: Secondary Uses and Privacy

20 December 2008: Another Cluster of Cable Cuts

6 April 2008: An Outage from Managing P2P Traffic?

4 February 2008: Underwater Fiber Cuts in the Middle East

28 August 2007: Update on the Amtrak Outage

15 July 2020: Hot Take on the Twitter Hack

12 September 2019: What is a Security Mechanism?

14 May 2018: The Security Problem with HTML Email

4 January 2018: Meltdown and Spectre: Security is a Systems Property

16 October 2017: Another Thought About KRACK

16 October 2017: Two More Crypto Holes

20 September 2017: Yet Another Update on Equifax

16 September 2017: Preliminary Thoughts on The Equifax Hack

16 May 2017: Who Pays?

12 May 2017: Patching is Hard

28 March 2016: The FBI and the iPhone: Important Unanswered Questions

24 April 2015: What Congress Should Do About Cybersecurity

19 February 2015: Hiding in the Firmware?

16 February 2015: What Must We Trust?

13 January 2015: Software Insecurity: The Problem with the White House Cybersecurity Proposals

18 May 2012: Another Company Doesn't Understand Phishing

28 April 2012: The Dangers of Asking for Social Network Passwords

5 February 2012: The FBI and Scotland Yard versus Anonymous: Security Lessons

27 December 2011: Weird Idea of the Day

23 September 2010: The Buried Threat in that Tweet

11 July 2010: Comments on the National Strategy for Trusted Identities in Cyberspace

11 December 2009: The Real Face of Cyberwar?

3 November 2009: The Role of a Cybersecurity Czar

12 April 2009: The Cybersecurity Act of 2009

24 July 2008: Cybersecurity Advice for (Possible) President Obama

19 April 2008: PayPal is Wrong About Unsafe Browsers

18 January 2008: The CIA Blames Hackers for Power Outages

16 October 2007: The Proper Benefit of an iPhone Design Mistake

29 August 2007: The FBI and Computer Security (Updated)

24 August 2007: Defending Against the Owner

3 August 2007: Are Secure Systems Possible?

23 July 2007: Security Flaw in the iPhone

4 January 2018: Meltdown and Spectre: Security is a Systems Property

7 July 2015: Keys under the Doormat

27 January 2008: The Dangers of the Protect America Act

12 May 2017: Patching is Hard

4 January 2018: Meltdown and Spectre: Security is a Systems Property

15 July 2020: Hot Take on the Twitter Hack

19 April 2008: PayPal is Wrong About Unsafe Browsers

7 August 2018: The Economics of Hacking an Election

30 May 2012: Update on Hand Recount

15 May 2012: An Interesting Recount

4 April 2008: Buggy Voting Systems in New Jersey