Recently Bought a Windows Computer? Microsoft Probably Has Your Encryption Key
New Windows devices have disk encryption turned on by default. But what happens to your recovery key?
New Windows devices have disk encryption turned on by default. But what happens to your recovery key?
The NSA whistleblower sat down with <em>The Intercept</em>’s Micah Lee in Moscow.
The exposure of millions of phone records across dozens of states sheds light on the dubious claims and practices of Securus Technologies.
Today I'm going to dive into the science of searching for extraterrestrial life in our galaxy, communicating across interstellar distances, and the role that encryption and information theory play in all of this.
XCodeGhost tricks developers into releasing apps infected with malicious software — a technique pioneered by the CIA and described by <em>The Intercept</em> six months ago.
How to put a fake computer inside your real computer, protecting yourself from sketchy attachments, websites, and software.
In 2012, the company added a feature to its spyware to monitor traffic from Tor Browser on an infected device. Suddenly, a new world opened up to government agents — including at the FBI.
How to have encrypted chats across four computing platforms — without compromising your identity or partner.
Christopher Soghoian noticed Thursday that Hacking Team employee Daniele Milan had joked in April about gathering enough Bitcoins to pay for his assassination.
The NSA's phone metadata program is being ended. But XKEYSCORE and mass internet surveillance almost certainly continues — and is more outrageous.
This is not a paywall.
By signing up, I agree to receive emails from The Intercept and to the Privacy Policy and Terms of Use.