Apple
23 July 2007: Security Flaw in the iPhone
24 August 2007: Defending Against the Owner
10 September 2007: What's Missing in the iPod Touch
1 October 2007: The Technical-Social Contract
16 October 2007: The Proper Benefit of an iPhone Design Mistake
23 January 2008: Apple Adds the Missing Applications to the iPod Touch
13 March 2008: Privacy: Little Brother
2 December 2008: Cybercrime and "Remote Search"
20 April 2011: Apple and Location-Tracking
6 June 2012: Restricting Anti-Virus Won't Work
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
22 July 2014: What Should PGP Look Like?
15 September 2014: The U2 Incident
23 September 2014: Apple's "Warrant-Proof" Encryption
19 February 2015: Hiding in the Firmware?
28 March 2016: The FBI and the iPhone: Important Unanswered Questions
24 August 2016: Does Apple's Cloud Key Vault Answer the Key Escrow Question?
12 May 2017: Patching is Hard
16 May 2017: Who Pays?
11 March 2019: Facebook and Privacy
Avi Rubin
1 August 2007: Electronic Voting Machines
Bitcoin
30 December 2017: Bitcoin---The Andromeda Strain of Computer Science Research
Bruce Schneier
6 July 2007: The Greek Cellphone Tapping Scandal
1 August 2007: Electronic Voting Machines
7 July 2015: Keys under the Doormat
19 July 2018: Posting PDFs
CALEA
6 July 2007: The Greek Cellphone Tapping Scandal
15 January 2008: A New Internet Wiretapping Plan?
CFAA
12 September 2019: What is a Security Mechanism?
CIA
28 July 2007: Insider Attacks
12 November 2007: A Bad Week for Privacy
18 January 2008: The CIA Blames Hackers for Power Outages
26 September 2009: The Problem of Computerized Search
20 July 2014: What Spies Do
19 December 2014: Did the DPRK Hack Sony?
7 March 2017: Wikileaks, the CIA, and the Press
8 August 2018: Foldering
copyright
17 June 2008: The Associated Press and Fair Use
29 July 2008: Control as a Motive for Content Owners
3 September 2008: This Blog and Creative Commons
8 March 2009: Access to Old Information
12 September 2009: Skype's EULA
15 September 2009: Update to Skype's EULA
13 January 2010: Why I Won't Buy an E-book Reader -- and When I Might
15 July 2010: How DRM Can Hurt Sales
14 September 2010: Intel's "Known-Good" Plan
18 January 2012: USACM SOPA and PIPA Letters
1 April 2015: ISPs to Enforce Copyright Law
cryptocurrency
30 December 2017: Bitcoin---The Andromeda Strain of Computer Science Research
cryptography
30 December 2008: Companies, Courts, and Computer Security
21 May 2013: The Oldest Algorithmic Patent?
22 April 2014: Doing Crypto
22 July 2014: What Should PGP Look Like?
23 September 2014: Apple's "Warrant-Proof" Encryption
5 February 2015: The Uses and Abuses of Cryptography
7 July 2015: Keys under the Doormat
22 December 2015: Cryptography is Hard
3 January 2016: Why More Effort Won't Solve the Exceptional Access Problem
8 April 2016: Problems with the Burr-Feinstein Bill
24 August 2016: Does Apple's Cloud Key Vault Answer the Key Escrow Question?
16 October 2017: Two More Crypto Holes
16 October 2017: Another Thought About KRACK
27 October 2017: Historical Loop
24 March 2018: Crypto War III: Assurance
25 April 2018: Ray Ozzie's Proposal: Not a Step Forward
1 August 2019: Facebook, Privacy, and Cryptography
7 October 2019: The Crypto Wars Resume
24 March 2025: Security Turtles All the Way Down
cyberspooks
16 July 2010: Scary Security Developments
27 September 2010: Stuxnet: The First Weaponized Software?
16 October 2010: The Worm and the Wiretap
21 October 2011: The Sins of the Flash
1 June 2012: Flame On!
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
19 December 2014: Did the DPRK Hack Sony?
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
7 March 2017: Wikileaks, the CIA, and the Press
25 March 2019: A Dangerous, Norm-Destroying Attack
Ed Felten
1 August 2007: Electronic Voting Machines
4 April 2008: Buggy Voting Systems in New Jersey
30 December 2008: Companies, Courts, and Computer Security
3 August 2012: I'm Going to Washington...
13 March 2018: Ed Felten to be Named as a PCLOB Board Member
27 October 2018: A Voting Disaster Foretold
exceptional access
6 July 2007: The Greek Cellphone Tapping Scandal
16 October 2010: The Worm and the Wiretap
7 July 2015: Keys under the Doormat
3 January 2016: Why More Effort Won't Solve the Exceptional Access Problem
28 March 2016: The FBI and the iPhone: Important Unanswered Questions
8 April 2016: Problems with the Burr-Feinstein Bill
24 August 2016: Does Apple's Cloud Key Vault Answer the Key Escrow Question?
24 March 2018: Crypto War III: Assurance
25 April 2018: Ray Ozzie's Proposal: Not a Step Forward
1 August 2019: Facebook, Privacy, and Cryptography
7 October 2019: The Crypto Wars Resume
Facebook
12 November 2007: A Bad Week for Privacy
5 December 2007: Facebook Apologizes
15 December 2008: The Report on "Securing Cyberspace for the 44th Presidency"
16 August 2010: A Facebook Privacy Study
18 July 2011: Will the Circle Be Unbroken?
28 April 2012: The Dangers of Asking for Social Network Passwords
2 June 2015: Facebook and PGP
12 May 2017: Patching is Hard
16 November 2017: Facebook's Initiative Against "Revenge Porn"
4 May 2018: Facebook's New Dating App
11 March 2019: Facebook and Privacy
1 August 2019: Facebook, Privacy, and Cryptography
24 May 2020: Facebook, Abuse, and Metadata
file-sharing
5 July 2007: Belgian Court Rules ISPs Must Stop File-Sharing
23 September 2007: Personal Data Disclosed via Peer-to-Peer Networks
19 October 2007: Comcast Apparently Blocking Some Peer-to-Peer Traffic
22 October 2007: More on Comcast Blocking Peer-to-Peer Traffic
9 December 2007: Western Digital's Crippled Drive
27 March 2008: Comcast Will Stop Blocking BitTorrent
29 July 2008: Control as a Motive for Content Owners
19 November 2009: Congress and Peer-to-Peer Filesharing
FTC
15 December 2008: The Report on "Securing Cyberspace for the 44th Presidency"
28 December 2011: Weird Idea of the Day -- Analysis
10 June 2012: Password Leaks
3 August 2012: I'm Going to Washington...
23 August 2013: I'm Back...
9 November 2018: Protecting Privacy Differently
15 July 2020: Hot Take on the Twitter Hack
Google
1 October 2007: The Technical-Social Contract
12 November 2007: A Bad Week for Privacy
31 December 2007: Exploiting Linkages for Good
15 January 2008: A New Internet Wiretapping Plan?
13 March 2008: Privacy: Little Brother
24 November 2008: Will Google Need a Bailout Some Day?
15 December 2008: The Report on "Securing Cyberspace for the 44th Presidency"
13 January 2009: YouTube, the Government, and Privacy
22 January 2009: More on YouTube, the Government, and Privacy
2 March 2009: The White House Removes Videos from YouTube
8 March 2009: Access to Old Information
13 January 2010: Google, China, and Lawful Intercept
16 January 2010: Why Isn't My Web Site Encrypted?
2 March 2011: Doing History
18 July 2011: Will the Circle Be Unbroken?
28 April 2012: The Dangers of Asking for Social Network Passwords
24 February 2014: Speculation About Goto Fail
11 April 2014: Heartbleed: Don't Panic
2 June 2015: Facebook and PGP
12 May 2017: