29 June 2007: Quantum Cryptography
3 July 2007: Beer and Privacy
13 July 2007: Fidget Toys
19 July 2007: Checkers: Solved
28 July 2007: Insider Attacks
20 August 2007: The Skype Outage
24 August 2007: Defending Against the Owner
28 August 2007: Update on the Amtrak Outage
30 September 2007: The Mets
10 October 2007: This is Disgusting
12 November 2007: A Bad Week for Privacy
16 November 2007: Attempted Credit Card Fraud?
5 December 2007: Facebook Apologizes
12 December 2007: Ask.com's "AskEraser"
12 December 2007: Full Text Feed Coming Soon
31 December 2007: Full Text Feed Installed
31 December 2007: Exploiting Linkages for Good
11 January 2008: Hacking Trains
13 February 2008: Teach a Man to Phish
16 February 2008: A Technical Mistake
13 March 2008: Privacy: Little Brother
29 March 2008: Threat Models
3 September 2008: This Blog and Creative Commons
5 November 2008: Working the Polls
20 December 2008: Another Cluster of Cable Cuts
9 January 2009: A Telegraph-Era TLD?
12 September 2009: Skype's EULA
15 September 2009: Update to Skype's EULA
21 September 2009: A Good Mailer for Mac OS?
11 December 2009: The Real Face of Cyberwar?
11 June 2010: I'm Not Dead Yet
15 July 2010: How DRM Can Hurt Sales
16 August 2010: A Facebook Privacy Study
14 September 2010: Intel's "Known-Good" Plan
23 September 2010: The Buried Threat in that Tweet
16 October 2010: The Worm and the Wiretap
11 November 2010: Firewall Configuration Study
2 March 2011: Doing History
18 March 2011: The RSA SecurID Problem
28 March 2011: I've Gone Encrypted
28 May 2011: RSA Breach Fallout?
30 June 2011: Robert Morris, 78
2 October 2011: The Untrusted Path
21 October 2011: The Sins of the Flash
17 November 2011: Rewriting History
27 December 2011: Weird Idea of the Day
10 January 2012: Types of Attack
13 January 2012: Bilateral Authentication
18 January 2012: USACM SOPA and PIPA Letters
15 May 2012: An Interesting Recount
30 May 2012: Update on Hand Recount
1 June 2012: Flame On!
10 June 2012: Password Leaks
19 June 2012: Fixing Holes
23 August 2013: I'm Back...
30 August 2013: Searching the NSA's Emails
23 February 2014: Goto Fail
24 February 2014: Speculation About Goto Fail
11 April 2014: Heartbleed: Don't Panic
22 April 2014: Doing Crypto
6 June 2014: The Battle of Midway
20 July 2014: What Spies Do
15 September 2014: The U2 Incident
19 December 2014: Did the DPRK Hack Sony?
16 February 2015: What Must We Trust?
19 February 2015: Hiding in the Firmware?
15 March 2015: Update on Net Neutrality
2 June 2015: Facebook and PGP
7 July 2015: Keys under the Doormat
24 November 2015: Why I Wrote Thinking Security
22 December 2015: Cryptography is Hard
25 August 2016: Once Again, Don't Panic
1 May 2017: The n^2 Problem
12 May 2017: Patching is Hard
16 May 2017: Who Pays?
1 September 2017: Security is a System Property
18 September 2017: Update on Equifax
20 September 2017: Yet Another Update on Equifax
16 October 2017: Two More Crypto Holes
16 October 2017: Another Thought About KRACK
27 October 2017: Historical Loop
24 March 2018: Crypto War III: Assurance
19 July 2018: Posting PDFs
8 August 2018: Foldering
27 October 2018: A Voting Disaster Foretold
11 March 2019: Facebook and Privacy
12 September 2019: What is a Security Mechanism?
7 October 2019: The Crypto Wars Resume
19 January 2020: Y2038: It's a Threat
14 March 2020: Notes on a Zoom Class
6 April 2020: Trusting Zoom?
29 April 2020: Software Done in a Hurry
11 June 2020: Trust Binding
25 February 2021: Security Priorities
9 May 2024: My Retirement Talk
3 November 2024: Voting: The Role of Process