
Massive Hack of 70 Million Prisoner Phone Calls Indicates Violations of Attorney-Client Privilege
The exposure of millions of phone records across dozens of states sheds light on the dubious claims and practices of Securus Technologies.
The exposure of millions of phone records across dozens of states sheds light on the dubious claims and practices of Securus Technologies.
Today I'm going to dive into the science of searching for extraterrestrial life in our galaxy, communicating across interstellar distances, and the role that encryption and information theory play in all of this.
XCodeGhost tricks developers into releasing apps infected with malicious software — a technique pioneered by the CIA and described by <em>The Intercept</em> six months ago.
How to put a fake computer inside your real computer, protecting yourself from sketchy attachments, websites, and software.
In 2012, the company added a feature to its spyware to monitor traffic from Tor Browser on an infected device. Suddenly, a new world opened up to government agents — including at the FBI.
How to have encrypted chats across four computing platforms — without compromising your identity or partner.
Christopher Soghoian noticed Thursday that Hacking Team employee Daniele Milan had joked in April about gathering enough Bitcoins to pay for his assassination.
The NSA's phone metadata program is being ended. But XKEYSCORE and mass internet surveillance almost certainly continues — and is more outrageous.
Snowden Archive
Documents provided by NSA whistleblower Edward Snowden shed light on the inner workings of XKEYSCORE, one of the most extensive programs of mass surveillance in human history.
Snowden Archive
One of the NSA's most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse.