Apple
23 July 2007: Security Flaw in the iPhone
24 August 2007: Defending Against the Owner
10 September 2007: What's Missing in the iPod Touch
1 October 2007: The Technical-Social Contract
16 October 2007: The Proper Benefit of an iPhone Design Mistake
23 January 2008: Apple Adds the Missing Applications to the iPod Touch
13 March 2008: Privacy: Little Brother
2 December 2008: Cybercrime and "Remote Search"
20 April 2011: Apple and Location-Tracking
6 June 2012: Restricting Anti-Virus Won't Work
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
22 July 2014: What Should PGP Look Like?
15 September 2014: The U2 Incident
23 September 2014: Apple's "Warrant-Proof" Encryption
19 February 2015: Hiding in the Firmware?
28 March 2016: The FBI and the iPhone: Important Unanswered Questions
24 August 2016: Does Apple's Cloud Key Vault Answer the Key Escrow Question?
12 May 2017: Patching is Hard
16 May 2017: Who Pays?
11 March 2019: Facebook and Privacy
Avi Rubin
1 August 2007: Electronic Voting Machines
Bitcoin
30 December 2017: Bitcoin---The Andromeda Strain of Computer Science Research
Bruce Schneier
6 July 2007: The Greek Cellphone Tapping Scandal
1 August 2007: Electronic Voting Machines
7 July 2015: Keys under the Doormat
19 July 2018: Posting PDFs
CALEA
6 July 2007: The Greek Cellphone Tapping Scandal
15 January 2008: A New Internet Wiretapping Plan?
CFAA
12 September 2019: What is a Security Mechanism?
CIA
28 July 2007: Insider Attacks
12 November 2007: A Bad Week for Privacy
18 January 2008: The CIA Blames Hackers for Power Outages
26 September 2009: The Problem of Computerized Search
20 July 2014: What Spies Do
19 December 2014: Did the DPRK Hack Sony?
7 March 2017: Wikileaks, the CIA, and the Press
8 August 2018: Foldering
copyright
17 June 2008: The Associated Press and Fair Use
29 July 2008: Control as a Motive for Content Owners
3 September 2008: This Blog and Creative Commons
8 March 2009: Access to Old Information
12 September 2009: Skype's EULA
15 September 2009: Update to Skype's EULA
13 January 2010: Why I Won't Buy an E-book Reader -- and When I Might
15 July 2010: How DRM Can Hurt Sales
14 September 2010: Intel's "Known-Good" Plan
18 January 2012: USACM SOPA and PIPA Letters
1 April 2015: ISPs to Enforce Copyright Law
cryptocurrency
30 December 2017: Bitcoin---The Andromeda Strain of Computer Science Research
cryptography
30 December 2008: Companies, Courts, and Computer Security
21 May 2013: The Oldest Algorithmic Patent?
22 April 2014: Doing Crypto
22 July 2014: What Should PGP Look Like?
23 September 2014: Apple's "Warrant-Proof" Encryption
5 February 2015: The Uses and Abuses of Cryptography
7 July 2015: Keys under the Doormat
22 December 2015: Cryptography is Hard
3 January 2016: Why More Effort Won't Solve the Exceptional Access Problem
8 April 2016: Problems with the Burr-Feinstein Bill
24 August 2016: Does Apple's Cloud Key Vault Answer the Key Escrow Question?
16 October 2017: Two More Crypto Holes
16 October 2017: Another Thought About KRACK
27 October 2017: Historical Loop
24 March 2018: Crypto War III: Assurance
25 April 2018: Ray Ozzie's Proposal: Not a Step Forward
1 August 2019: Facebook, Privacy, and Cryptography
7 October 2019: The Crypto Wars Resume
cyberspooks
16 July 2010: Scary Security Developments
27 September 2010: Stuxnet: The First Weaponized Software?
16 October 2010: The Worm and the Wiretap
21 October 2011: The Sins of the Flash
1 June 2012: Flame On!
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
19 December 2014: Did the DPRK Hack Sony?
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
7 March 2017: Wikileaks, the CIA, and the Press
25 March 2019: A Dangerous, Norm-Destroying Attack
Ed Felten
1 August 2007: Electronic Voting Machines
4 April 2008: Buggy Voting Systems in New Jersey
30 December 2008: Companies, Courts, and Computer Security
3 August 2012: I'm Going to Washington...
13 March 2018: Ed Felten to be Named as a PCLOB Board Member
27 October 2018: A Voting Disaster Foretold
exceptional access
6 July 2007: The Greek Cellphone Tapping Scandal
16 October 2010: The Worm and the Wiretap
7 July 2015: Keys under the Doormat
3 January 2016: Why More Effort Won't Solve the Exceptional Access Problem
28 March 2016: The FBI and the iPhone: Important Unanswered Questions
8 April 2016: Problems with the Burr-Feinstein Bill
24 August 2016: Does Apple's Cloud Key Vault Answer the Key Escrow Question?
24 March 2018: Crypto War III: Assurance
25 April 2018: Ray Ozzie's Proposal: Not a Step Forward
1 August 2019: Facebook, Privacy, and Cryptography
7 October 2019: The Crypto Wars Resume
Facebook
12 November 2007: A Bad Week for Privacy
5 December 2007: Facebook Apologizes
15 December 2008: The Report on "Securing Cyberspace for the 44th Presidency"
16 August 2010: A Facebook Privacy Study
18 July 2011: Will the Circle Be Unbroken?
28 April 2012: The Dangers of Asking for Social Network Passwords
2 June 2015: Facebook and PGP
12 May 2017: Patching is Hard
16 November 2017: Facebook's Initiative Against "Revenge Porn"
4 May 2018: Facebook's New Dating App
11 March 2019: Facebook and Privacy
1 August 2019: Facebook, Privacy, and Cryptography
24 May 2020: Facebook, Abuse, and Metadata
file-sharing
5 July 2007: Belgian Court Rules ISPs Must Stop File-Sharing
23 September 2007: Personal Data Disclosed via Peer-to-Peer Networks
19 October 2007: Comcast Apparently Blocking Some Peer-to-Peer Traffic
22 October 2007: More on Comcast Blocking Peer-to-Peer Traffic
9 December 2007: Western Digital's Crippled Drive
27 March 2008: Comcast Will Stop Blocking BitTorrent
29 July 2008: Control as a Motive for Content Owners
19 November 2009: Congress and Peer-to-Peer Filesharing
FTC
15 December 2008: The Report on "Securing Cyberspace for the 44th Presidency"
28 December 2011: Weird Idea of the Day -- Analysis
10 June 2012: Password Leaks
3 August 2012: I'm Going to Washington...
23 August 2013: I'm Back...
9 November 2018: Protecting Privacy Differently
15 July 2020: Hot Take on the Twitter Hack
Google
1 October 2007: The Technical-Social Contract
12 November 2007: A Bad Week for Privacy
31 December 2007: Exploiting Linkages for Good
15 January 2008: A New Internet Wiretapping Plan?
13 March 2008: Privacy: Little Brother
24 November 2008: Will Google Need a Bailout Some Day?
15 December 2008: The Report on "Securing Cyberspace for the 44th Presidency"
13 January 2009: YouTube, the Government, and Privacy
22 January 2009: More on YouTube, the Government, and Privacy
2 March 2009: The White House Removes Videos from YouTube
8 March 2009: Access to Old Information
13 January 2010: Google, China, and Lawful Intercept
16 January 2010: Why Isn't My Web Site Encrypted?
2 March 2011: Doing History
18 July 2011: Will the Circle Be Unbroken?
28 April 2012: The Dangers of Asking for Social Network Passwords
24 February 2014: Speculation About Goto Fail
11 April 2014: Heartbleed: Don't Panic
2 June 2015: Facebook and PGP
12 May 2017: Patching is Hard
16 May 2017: Who Pays?
4 January 2018: Meltdown and Spectre: Security is a Systems Property
8 August 2018: Foldering
history
9 January 2009: A Telegraph-Era TLD?
8 March 2009: Access to Old Information
2 March 2011: Doing History
30 June 2011: Robert Morris, 78
17 November 2011: Rewriting History
25 December 2011: Lessons from Suppressing Research
21 May 2013: The Oldest Algorithmic Patent?
6 June 2014: The Battle of Midway
27 October 2017: Historical Loop
14 November 2019: The Early History of Usenet, Part I: Prologue
14 November 2019: The Early History of Usenet, Part II: The Technological Setting
15 November 2019: The Early History of Usenet, Part III: Hardware and Economics
17 November 2019: The Early History of Usenet, Part IV: File Format
21 November 2019: The Early History of Usenet, Part V: Implementation and User Experience
22 November 2019: The Early History of Usenet, Part VI: Authentication and Norms
25 November 2019: The Early History of Usenet, Part VII: The Public Announcement
30 November 2019: The Early History of Usenet, Part VIII: Usenet Growth and B-news
26 December 2019: The Early History of Usenet, Part IX: The Great Renaming
9 January 2020: The Early History of Usenet, Part X: Retrospective Thoughts
9 January 2020: The Early History of Usenet, Part XI: Errata
legal
19 June 2007: The Court of Appeals and Email Privacy
5 July 2007: Belgian Court Rules ISPs Must Stop File-Sharing
7 July 2007: Pen Registers and the Internet
20 July 2007: Secondary Uses and Privacy
26 July 2007: Hacking Forensic Software
15 January 2008: A New Internet Wiretapping Plan?
27 January 2008: The Dangers of the Protect America Act
22 April 2008: New Jersey Supreme Court Protects Internet Users' Privacy
17 June 2008: The Associated Press and Fair Use
10 July 2008: FISA and Border Searches of Laptops
2 December 2008: Cybercrime and "Remote Search"
30 December 2008: Companies, Courts, and Computer Security
22 January 2009: More on YouTube, the Government, and Privacy
4 February 2009: More on Access to Alcohol Breath Tester Source Code
28 February 2009: Computer Processing and the Law
2 March 2009: The White House Removes Videos from YouTube
19 March 2009: Internet Records Retention Bill
12 April 2009: The Cybersecurity Act of 2009
12 September 2009: Skype's EULA
15 September 2009: Update to Skype's EULA
26 September 2009: The Problem of Computerized Search
3 November 2009: The Role of a Cybersecurity Czar
8 September 2010: Online Symposium on "The Future of the Internet -- And How to Stop It"
6 December 2013: Alternate Universes: Academic Publishing in Computer Science vs. Law
4 June 2014: Machine Learning and the Fourth Amendment
23 September 2014: Apple's "Warrant-Proof" Encryption
Matt Blaze
6 July 2007: The Greek Cellphone Tapping Scandal
1 August 2007: Electronic Voting Machines
6 August 2007: Dealing With Security Problems
14 August 2007: Safes, Locks, and Override Codes
29 August 2007: The FBI and Computer Security (Updated)
27 January 2008: The Dangers of the Protect America Act
16 February 2008: A Technical Mistake
13 January 2010: Google, China, and Lawful Intercept
23 September 2014: Apple's "Warrant-Proof" Encryption
7 July 2015: Keys under the Doormat
14 May 2018: The Security Problem with HTML Email
7 August 2018: The Economics of Hacking an Election
Meltdown
4 January 2018: Meltdown and Spectre: Security is a Systems Property
Mets
30 September 2007: The Mets
5 October 2007: Screendump: #1 in a Random Series of Messages You Shouldn't See
3 August 2012: I'm Going to Washington...
Microsoft
19 February 2019: Microsoft is Abandoning SHA-1 Hashes for Updates---But Why?
ML
4 May 2018: Facebook's New Dating App
25 January 2019: Yes, "algorithms" can be biased. Here's why.
Netnews
14 November 2019: The Early History of Usenet, Part I: Prologue
14 November 2019: The Early History of Usenet, Part II: The Technological Setting
15 November 2019: The Early History of Usenet, Part III: Hardware and Economics
17 November 2019: The Early History of Usenet, Part IV: File Format
21 November 2019: The Early History of Usenet, Part V: Implementation and User Experience
22 November 2019: The Early History of Usenet, Part VI: Authentication and Norms
25 November 2019: The Early History of Usenet, Part VII: The Public Announcement
30 November 2019: The Early History of Usenet, Part VIII: Usenet Growth and B-news
26 December 2019: The Early History of Usenet, Part IX: The Great Renaming
9 January 2020: The Early History of Usenet, Part X: Retrospective Thoughts
9 January 2020: The Early History of Usenet, Part XI: Errata
NSA
29 June 2007: Quantum Cryptography
4 February 2008: Underwater Fiber Cuts in the Middle East
10 July 2008: FISA and Border Searches of Laptops
18 December 2009: Intercepting U.S. Surveillance Videos
27 September 2010: Stuxnet: The First Weaponized Software?
16 October 2010: The Worm and the Wiretap
2 March 2011: Doing History
21 October 2011: The Sins of the Flash
25 December 2011: Lessons from Suppressing Research
23 August 2013: I'm Back...
30 August 2013: Searching the NSA's Emails
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
20 July 2014: What Spies Do
22 July 2014: What Should PGP Look Like?
19 December 2014: Did the DPRK Hack Sony?
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
2 June 2015: Facebook and PGP
15 October 2015: I'm Shocked, Shocked to Find There's Cryptanalysis Going On Here (Your plaintext, sir.)
7 March 2017: Wikileaks, the CIA, and the Press
1 September 2017: Security is a System Property
24 March 2018: Crypto War III: Assurance
19 July 2018: Posting PDFs
Orin Kerr
10 July 2008: FISA and Border Searches of Laptops
4 June 2014: Machine Learning and the Fourth Amendment
23 September 2014: Apple's "Warrant-Proof" Encryption
8 April 2016: Problems with the Burr-Feinstein Bill
12 September 2019: What is a Security Mechanism?
passwords
28 April 2012: The Dangers of Asking for Social Network Passwords
patching
24 July 2008: Cybersecurity Advice for (Possible) President Obama
29 April 2009: The Open Source Quality Challenge
13 July 2010: Clarke and Knake's "Cyberwar"
27 September 2010: Stuxnet: The First Weaponized Software?
2 October 2011: The Untrusted Path
10 January 2012: Types of Attack
5 February 2012: The FBI and Scotland Yard versus Anonymous: Security Lessons
19 June 2012: Fixing Holes
24 February 2014: Speculation About Goto Fail
11 April 2014: Heartbleed: Don't Panic
28 March 2016: The FBI and the iPhone: Important Unanswered Questions
25 August 2016: Once Again, Don't Panic
12 May 2017: Patching is Hard
16 May 2017: Who Pays?
28 June 2017: Patching is Hard and Risky---But Sometimes, You MUST
1 September 2017: Security is a System Property
16 September 2017: Preliminary Thoughts on The Equifax Hack
16 October 2017: Two More Crypto Holes
19 February 2019: Microsoft is Abandoning SHA-1 Hashes for Updates---But Why?
25 March 2019: A Dangerous, Norm-Destroying Attack
15 June 2019: Buying Computers Properly
11 June 2020: Trust Binding
PCLOB
13 March 2018: Ed Felten to be Named as a PCLOB Board Member
PGP
6 July 2007: The Greek Cellphone Tapping Scandal
22 July 2014: What Should PGP Look Like?
2 June 2015: Facebook and PGP
privacy
3 July 2007: Beer and Privacy
20 July 2007: Secondary Uses and Privacy
23 September 2007: Personal Data Disclosed via Peer-to-Peer Networks
31 October 2007: "Do Not Track": All or Nothing?
12 November 2007: A Bad Week for Privacy
27 November 2007: The FBI Denies Tracking Ethnic Foods
5 December 2007: Facebook Apologizes
6 December 2007: More Tracking Mania: PDFs with Ads
12 December 2007: Ask.com's "AskEraser"
31 December 2007: Exploiting Linkages for Good
13 March 2008: Privacy: Little Brother
26 March 2008: The Passport File Controversy
29 March 2008: Threat Models
22 April 2008: New Jersey Supreme Court Protects Internet Users' Privacy
10 July 2008: FISA and Border Searches of Laptops
10 August 2008: Update on Laptop Border Searches
4 September 2008: Political Agendas for Network Design?
2 December 2008: Cybercrime and "Remote Search"
13 January 2009: YouTube, the Government, and Privacy
22 January 2009: More on YouTube, the Government, and Privacy
2 March 2009: The White House Removes Videos from YouTube
3 March 2009: EFF's Surveillance Self-Defense Website
19 March 2009: Internet Records Retention Bill
16 August 2010: A Facebook Privacy Study
8 September 2010: Online Symposium on "The Future of the Internet -- And How to Stop It"
28 March 2011: I've Gone Encrypted
20 April 2011: Apple and Location-Tracking
13 January 2012: Bilateral Authentication
4 June 2014: Machine Learning and the Fourth Amendment
15 September 2014: The U2 Incident
23 September 2014: Apple's "Warrant-Proof" Encryption
11 November 2014: If it Doesn't Exist, it Can't be Abused
16 September 2017: Preliminary Thoughts on The Equifax Hack
18 September 2017: Update on Equifax
20 September 2017: Yet Another Update on Equifax
5 October 2017: Replacing Social Security Numbers Is Harder Than You Think
4 May 2018: Facebook's New Dating App
9 November 2018: Protecting Privacy Differently
11 March 2019: Facebook and Privacy
1 August 2019: Facebook, Privacy, and Cryptography
26 April 2020: The Price of Lack of Clarity
24 May 2020: Facebook, Abuse, and Metadata
quantum cryptography
29 June 2007: Quantum Cryptography
reliability
20 August 2007: The Skype Outage
26 August 2007: The Amtrak Ticket System Outage
28 August 2007: Update on the Amtrak Outage
4 February 2008: Underwater Fiber Cuts in the Middle East
7 February 2008: Abandoned Ship Anchor Found Near Cable Cut
6 April 2008: An Outage from Managing P2P Traffic?
8 April 2008: Ships Impounded in Cable Cut
18 April 2008: Comcast Outage: Not P2P-Related
20 December 2008: Another Cluster of Cable Cuts
29 April 2009: The Open Source Quality Challenge
14 October 2013: Software is Hard: The Healthcare.gov Problem
revenge porn
16 November 2017: Facebook's Initiative Against "Revenge Porn"
security
13 July 2007: Security and Usability: Windows Vista
23 July 2007: Security Flaw in the iPhone
26 July 2007: Hacking Forensic Software
28 July 2007: Insider Attacks
3 August 2007: Are Secure Systems Possible?
6 August 2007: Dealing With Security Problems
14 August 2007: Safes, Locks, and Override Codes
24 August 2007: Defending Against the Owner
29 August 2007: The FBI and Computer Security (Updated)
5 October 2007: Screendump: #1 in a Random Series of Messages You Shouldn't See
16 October 2007: The Proper Benefit of an iPhone Design Mistake
16 November 2007: Attempted Credit Card Fraud?
11 January 2008: Hacking Trains
18 January 2008: The CIA Blames Hackers for Power Outages
29 January 2008: Massive Computer-Assisted Fraud
13 February 2008: Teach a Man to Phish
24 February 2008: A Pakistani ISP "Hijacks" Youtube
29 March 2008: Threat Models
19 April 2008: PayPal is Wrong About Unsafe Browsers
24 July 2008: Cybersecurity Advice for (Possible) President Obama
12 August 2008: The MBTA versus (Student) Security Researchers
28 November 2008: Making Security Incomprehensible
30 December 2008: Companies, Courts, and Computer Security
3 March 2009: EFF's Surveillance Self-Defense Website
12 April 2009: The Cybersecurity Act of 2009
29 April 2009: The Open Source Quality Challenge
23 July 2009: Emailing Attachments versus Sending Links
3 November 2009: The Role of a Cybersecurity Czar
11 December 2009: The Real Face of Cyberwar?
13 January 2010: Google, China, and Lawful Intercept
16 January 2010: Why Isn't My Web Site Encrypted?
13 July 2010: Clarke and Knake's "Cyberwar"
16 July 2010: Scary Security Developments
14 September 2010: Intel's "Known-Good" Plan
23 September 2010: The Buried Threat in that Tweet
11 November 2010: Firewall Configuration Study
18 March 2011: The RSA SecurID Problem
28 March 2011: I've Gone Encrypted
28 May 2011: RSA Breach Fallout?
2 October 2011: The Untrusted Path
27 October 2011: Correction re "Sins of the Flash"
18 November 2011: Water Supply System Apparently Hacked, with Physical Damage
27 December 2011: Weird Idea of the Day
10 January 2012: Types of Attack
13 January 2012: Bilateral Authentication
5 February 2012: The FBI and Scotland Yard versus Anonymous: Security Lessons
28 April 2012: The Dangers of Asking for Social Network Passwords
18 May 2012: Another Company Doesn't Understand Phishing
1 June 2012: Flame On!
6 June 2012: Restricting Anti-Virus Won't Work
10 June 2012: Password Leaks
19 June 2012: Fixing Holes
9 August 2012: State-Sponsored Banking Trojan?
30 August 2013: Searching the NSA's Emails
5 February 2014: Why the US Doesn't have Chip-and-PIN Credit Cards Yet
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
9 April 2014: Open Source Quality Challenge Redux
11 April 2014: Heartbleed: Don't Panic
22 April 2014: Doing Crypto
11 November 2014: If it Doesn't Exist, it Can't be Abused
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
24 April 2015: What Congress Should Do About Cybersecurity
28 May 2015: Hacking: Users, Computers, and Systems
24 November 2015: Why I Wrote Thinking Security
28 March 2016: The FBI and the iPhone: Important Unanswered Questions
24 August 2016: Does Apple's Cloud Key Vault Answer the Key Escrow Question?
25 August 2016: Once Again, Don't Panic
12 May 2017: Patching is Hard
16 May 2017: Who Pays?
28 June 2017: Patching is Hard and Risky---But Sometimes, You MUST
16 September 2017: Preliminary Thoughts on The Equifax Hack
18 September 2017: Update on Equifax
20 September 2017: Yet Another Update on Equifax
16 October 2017: Two More Crypto Holes
16 October 2017: Another Thought About KRACK
4 December 2017: Voluntary Reporting of Cybersecurity Incidents
4 January 2018: Meltdown and Spectre: Security is a Systems Property
14 May 2018: The Security Problem with HTML Email
19 July 2018: Posting PDFs
8 August 2018: Foldering
19 February 2019: Microsoft is Abandoning SHA-1 Hashes for Updates---But Why?
15 June 2019: Buying Computers Properly
12 September 2019: What is a Security Mechanism?
11 June 2020: Trust Binding
15 July 2020: Hot Take on the Twitter Hack
25 February 2021: Security Priorities
Spectre
4 January 2018: Meltdown and Spectre: Security is a Systems Property
Stuxnet
16 July 2010: Scary Security Developments
27 September 2010: Stuxnet: The First Weaponized Software?
1 June 2012: Flame On!
25 March 2019: A Dangerous, Norm-Destroying Attack
Susan Landau
6 July 2007: The Greek Cellphone Tapping Scandal
27 January 2008: The Dangers of the Protect America Act
23 September 2014: Apple's "Warrant-Proof" Encryption
7 July 2015: Keys under the Doormat
tulip bulbs
30 December 2017: Bitcoin---The Andromeda Strain of Computer Science Research
Twitter
15 July 2020: Hot Take on the Twitter Hack
usability
13 July 2007: Security and Usability: Windows Vista
13 February 2008: Teach a Man to Phish
19 April 2008: PayPal is Wrong About Unsafe Browsers
28 November 2008: Making Security Incomprehensible
11 November 2010: Firewall Configuration Study
Usenet
14 November 2019: The Early History of Usenet, Part I: Prologue
14 November 2019: The Early History of Usenet, Part II: The Technological Setting
15 November 2019: The Early History of Usenet, Part III: Hardware and Economics
17 November 2019: The Early History of Usenet, Part IV: File Format
21 November 2019: The Early History of Usenet, Part V: Implementation and User Experience
22 November 2019: The Early History of Usenet, Part VI: Authentication and Norms
25 November 2019: The Early History of Usenet, Part VII: The Public Announcement
30 November 2019: The Early History of Usenet, Part VIII: Usenet Growth and B-news
26 December 2019: The Early History of Usenet, Part IX: The Great Renaming
9 January 2020: The Early History of Usenet, Part X: Retrospective Thoughts
9 January 2020: The Early History of Usenet, Part XI: Errata
Usenet history
14 November 2019: The Early History of Usenet, Part I: Prologue
14 November 2019: The Early History of Usenet, Part II: The Technological Setting
15 November 2019: The Early History of Usenet, Part III: Hardware and Economics
17 November 2019: The Early History of Usenet, Part IV: File Format
21 November 2019: The Early History of Usenet, Part V: Implementation and User Experience
22 November 2019: The Early History of Usenet, Part VI: Authentication and Norms
25 November 2019: The Early History of Usenet, Part VII: The Public Announcement
30 November 2019: The Early History of Usenet, Part VIII: Usenet Growth and B-news
26 December 2019: The Early History of Usenet, Part IX: The Great Renaming
9 January 2020: The Early History of Usenet, Part X: Retrospective Thoughts
9 January 2020: The Early History of Usenet, Part XI: Errata
voting
1 August 2007: Electronic Voting Machines
6 January 2008: Good NY Times Magazine Article on E-Voting
4 April 2008: Buggy Voting Systems in New Jersey
5 November 2008: Working the Polls
15 May 2012: An Interesting Recount
30 May 2012: Update on Hand Recount
1 September 2017: Security is a System Property
7 August 2018: The Economics of Hacking an Election
6 September 2018: The National Academies Report "The Future of Voting"
27 October 2018: A Voting Disaster Foretold
31 October 2024: Voting While Temporarily Disabled
3 November 2024: Voting: The Role of Process
4 November 2024: A Last Blog Post About Voting
Washington
24 July 2008: Cybersecurity Advice for (Possible) President Obama
15 December 2008: The Report on "Securing Cyberspace for the 44th Presidency"
3 November 2009: The Role of a Cybersecurity Czar
19 November 2009: Congress and Peer-to-Peer Filesharing
18 January 2012: USACM SOPA and PIPA Letters
19 June 2012: Fixing Holes
3 August 2012: I'm Going to Washington...
23 August 2013: I'm Back...
27 February 2015: Packet Loss: How the Internet Enforces Speed Limits
24 April 2015: What Congress Should Do About Cybersecurity
7 July 2015: Keys under the Doormat
1 February 2016: Caveats About "Computer Science For All"
28 March 2016: The FBI and the iPhone: Important Unanswered Questions
8 April 2016: Problems with the Burr-Feinstein Bill
4 December 2017: Voluntary Reporting of Cybersecurity Incidents
13 March 2018: Ed Felten to be Named as a PCLOB Board Member
15 June 2019: Buying Computers Properly
wiretapping
19 June 2007: The Court of Appeals and Email Privacy
6 July 2007: The Greek Cellphone Tapping Scandal
7 July 2007: Pen Registers and the Internet
29 August 2007: The FBI and Computer Security (Updated)
15 January 2008: A New Internet Wiretapping Plan?
27 January 2008: The Dangers of the Protect America Act
16 February 2008: A Technical Mistake
26 September 2009: The Problem of Computerized Search
13 January 2010: Google, China, and Lawful Intercept
Zoom
14 March 2020: Notes on a Zoom Class
2 April 2020: Zoom Security: The Good, the Bad, and the Business Model
4 April 2020: Zoom Cryptography and Authentication Problems
6 April 2020: Trusting Zoom?