Encryption

Encryption Helps Ukrainians Resist Russia’s Invasion, but a European Plan Threatens the Underlying Trust Any Tech User Needs

by

Nov 17th, 2022

We Now Know What Information the FBI Can Obtain from Encrypted Messaging Apps

by

Dec 14th, 2021

What the Afghanistan Withdrawal Teaches Us About Safeguarding Human Rights Evidence

by

Nov 5th, 2021

Client-Side Scanning: A New Front In the War on User Control of Technology

by

Oct 28th, 2021

Encryption Originalism

by

Jul 16th, 2021

App Stores as Back-Doors for Government Regulation of End-to-End Encryption

by

Oct 15th, 2020

Don’t Blame Privacy for Big Tech’s Monopoly on Information

by

Sep 18th, 2020

Telegram’s Cryptocurrency Could Have a Terrorism Problem

by

Mar 5th, 2020

The FBI and Apple Redux

by

Feb 27th, 2020

Why the Ghost Keys ‘Solution’ to Encryption is No Solution

by

Jul 18th, 2019

Split Over Compelled Decryption Deepens With Massachusetts Case

by and

Apr 30th, 2019

Give Up the Ghost: A Backdoor by Another Name

by

Jan 4th, 2019

Tech Pressure on Privacy: National Security Requires a Fuller View of Corporate Social Responsibility

by

Jul 19th, 2018

How to Move the Battle Lines in the Crypto-Wars

by

Apr 5th, 2018

The EWI Encryption Report: Stop Trying to Sell Me a Shoebox

by

Mar 7th, 2018

Why An Encryption Backdoor for Just the “Good Guys” Won’t Work

by and

Mar 2nd, 2018

Where Does the Trump Administration Stand on Encryption?

by

Nov 28th, 2017

Responsibility and the Encryption Debate: A Response to DAG Rosenstein

by

Oct 17th, 2017

Feinstein-Burr 2.0: The Crypto Backdoor Bill Lives On

by

Sep 9th, 2016

The Encryption Debate: All Quiet on the Western Front?

by

Jul 6th, 2016

Feinstein-Burr: The Bill That Bans Your Browser

by

Apr 29th, 2016

Congress’s Embarrassingly Empty (National Security) Record

by

Apr 29th, 2016

Feinstein-Burr, Encryption, and “The Rule of Law”

by

Apr 19th, 2016

Here’s What the Burr-Feinstein Anti-Crypto Bill Gets Wrong

by

Apr 15th, 2016

FBI Discovers It Can Access That iPhone After All

by

Mar 22nd, 2016

Strong Intelligence Oversight Can Happen Within the Executive Branch

by

Mar 17th, 2016

Apple vs. FBI: “Just This Once”?

by

Feb 23rd, 2016

Security and the Internet of Things

by

Feb 11th, 2016

When the NSA Merges Its Offense and Defense, Encryption Loses

by

Feb 5th, 2016

The High Standard of Proof in the Encryption Debate

by

Feb 5th, 2016

Cryptopanic and James Comey’s Xanatos Gambit

by

Feb 2nd, 2016

Moving Beyond the “Going Dark” Frame

by

Feb 1st, 2016