Non-fungible tokens, or NFTs, are a pretty stupid idea. Not only do they legally not guarantee ownership of anything, the very idea they represent is inherently flawed.
Blockchain technology is one of the biggest buzzwords in tech in recent times. But what are blockchains and what do you need them for, really? Spoiler: Not much, actually.
When Whitfield Diffie, Ronald Rivest, Steven M. Bellovin, Peter Neumann, Matt Blaze and Bruce Schneier come together to publish a paper on the security and privacy implications of client-side scanning, we should listen up.
Authentication on the internet is fundamentally broken. Weak passwords, password reuse, data leaks and untrustworthy third parties tracking us while they log us in are the unfortunate reality right now. One man decided to single-handedly fix this mess.
What are the new features Apple is implementing in iOS 15 that have privacy and security people all up in arms? And why none of this should come a surprise to anyone who's actually paid some attention and is thinking for themselves instead of just buying the company propaganda.
The German police can now hack into computers and phones, without the target having to have committed a crime. Even though a Berlin court has just ruled evidence from similar hacks originating outside of Germany to be inadmissible in criminal proceedings in the country.
The German government wants to put trojans on its citizens' phones and other devices to crack end-to-end encrypted communications. And it wants to do it with as little due process as possible. Welcome to another battle in the Crypto Wars!
Ever since the Cold War, intelligence services and their sympathisers in Western governments have worked tirelessy to prevent everyday citizens from utilising effective encryption to shield their lives from prying eyes. When the Clipper chip failed, these people switched to influencing legislation to get what they want. And now they are at it again.
The story of how police cracked the encryption of the EncroChat phone is not only important to criminals who used these devices, but also an interesting case study of how such systems are attacked in practice.
The EARN IT Act is on its way to become law in the US and might make it impossible for service providers to keep effective end-to-end encryption in place for their products. And with that, it seems the Crypto Wars are back in full swing.