A review of a review, and a lot of discussion of password security, chaos, and entropy.
I’ve been working on a new way to explain email encryption; I’d appreciate feedback on this approach.
Cross-posted from the USABLE blog <p>Three years ago, I led a digital security training for independent media in Kyiv during the peak of the EuroMa...
I am transitioning both my professional and personal GPG keys.
This has all happened before. This will all happen again.
Software licensing limits are a bigger human rights problem than software piracy is a cost.
It was the second day of digital security training, and I was losing the room.
This is partially a footnotes section from last week’s Crypto Saves Lives post, but every week brings new stories, and this week was a doozy.
There are many great arguments to protect truly private communications from a human rights perspective, and specifically through a Constitutional lens
SAFETAG is a project that myself and another colleague have spent countless hours building out to really focus on working with small non-profits on assessing...
Buzzfeed’s writers al have PGP keys
Pivot-Twist-Dev takes the classic “pivot-twist” approach for idea pitches of taking a familiar concept and twisting it in a new way to the international deve...
You know what hasn’t gotten an update in a while? This blog! What else? The cute kittens of digital security over at icanhazdigitalsecurity
I am far from the first to compare digital security practices to safer sex practices; Jillian York even rapped about it on stage at re:publica in 2014
Let’s actually talk about how you might have trust in a software project, using Tor as an example.