Security Analysis of the MERGE Voting Protocol
Interesting analysis: An Internet Voting System Fatally Flawed in Creative New Ways. Abstract: The recently published “MERGE” protocol is designed…
Interesting analysis: An Internet Voting System Fatally Flawed in Creative New Ways. Abstract: The recently published “MERGE” protocol is designed…
Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device. I was going to…
Lots of details that are beyond me. Blog moderation policy.
Interesting analysis: We introduce and explore a little-known threat to digital equality and freedomwebsites geoblocking users in response to political…
With the rise of online scams and privacy risks, virtual private networks (VPNs) are becoming more popular for day-to-day use.…
This feels important: The Secret Service has used a technology called Locate X which uses location data harvested from ordinary…
Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device. I’ve spent more than…
Steve Bellovin is retiring. Here’s his retirement talk, reflecting on his career and what the cybersecurity field needs next.
The Rising Threat of Social Media Hackers Social media platforms are an integral part of daily life, but they are…
Interesting analysis: Although much attention is given to sophisticated, zero-click spyware developed by companies like Israel’s NSO Group, the Italian…