This page is a list of some of the top posts from the site. See here for a list of all posts.
Attacks of the Week
- The FREAK attack (and “hacking” the NSA’s website)
- Breaking Apple iMessage
- Triple Handshakes (a crazy attack on TLS/SSL)
- Cross-VM side channel attacks (your VM won’t save you)
The NSA, government surveillance and crypto backdoors
- On the NSA
- On the Juniper backdoor
- Logjam (discrete logarithm attacks against TLS/SSL and IPSec)
- How does the NSA break SSL?
- On the new Snowden documents
- The many flaws of Dual_EC_DRBG (and RSA BSAFE, and more, and more)
Explaining fundamental crypto and privacy concepts
- Zero Knowledge Proofs: an Illustrated Primer
- What is the Random Oracle Model and why should you care? (parts 2, 3, 4)
- What is Differential Privacy
- Cryptographic obfuscation and ‘unhackable’ software
- The Ideal Cipher model
Other Explainers
- Why can’t Apple decrypt your iPhone? (Also see this Slate piece.)