| | Cybersecurity in the US Fiscal Year 2016 Budget (cryptome.org) |
| 1 point by CapitalistCartr on Feb 2, 2015 | past |
|
| | NSА's MORECOWBELL: Knell for DNS [pdf] (cryptome.org) |
| 12 points by conductor on Jan 28, 2015 | past | 2 comments |
|
| | FTC Chairman Warns of IoT Data Privacy Threats [pdf] (cryptome.org) |
| 2 points by CapitalistCartr on Jan 12, 2015 | past |
|
| | Snowden's and NSA's High Salaries for Silence? (cryptome.org) |
| 4 points by CapitalistCartr on Jan 7, 2015 | past |
|
| | Digital Life in 2025: the Future of Privacy [pdf] (cryptome.org) |
| 1 point by CapitalistCartr on Dec 22, 2014 | past |
|
| | Sony Pictures Presents: The Propaganda Model [pdf] (cryptome.org) |
| 29 points by cinquemb on Dec 20, 2014 | past | 5 comments |
|
| | Barrett Brown Accuses Rolling Stone of Fakery [pdf] (cryptome.org) |
| 2 points by bradleysmith on Dec 11, 2014 | past |
|
| | GCHQ GERONTIC NIGELLA Bases Eyed (cryptome.org) |
| 2 points by robin_reala on Dec 2, 2014 | past |
|
| | ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras [pdf] (cryptome.org) |
| 2 points by aburan28 on Dec 2, 2014 | past |
|
| | Facebook Calls Its Users Insane [pdf] (cryptome.org) |
| 3 points by justcommenting on Nov 27, 2014 | past |
|
| | Do Snowden Files Have NSA Implants? (cryptome.org) |
| 3 points by aburan28 on Nov 25, 2014 | past |
|
| | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps [pdf] (cryptome.org) |
| 4 points by sirfapsalot on Nov 15, 2014 | past | 1 comment |
|
| | How DigiCash Blew Everything (1999) (cryptome.org) |
| 1 point by EthanHeilman on Nov 7, 2014 | past |
|
| | Detailed Report on Intel Subsidiary's Unauthorized Encryption Exports [pdf] (cryptome.org) |
| 1 point by aburan28 on Nov 4, 2014 | past |
|
| | BitLocker uploads device encryption keys to SkyDrive (cryptome.org) |
| 126 points by justcommenting on Nov 2, 2014 | past | 31 comments |
|
| | BTAgent – CPE backdoor (cryptome.org) |
| 145 points by aburan28 on Nov 1, 2014 | past | 17 comments |
|
| | The FBI Can Bypass Encryption [pdf] (cryptome.org) |
| 29 points by aburan28 on Oct 31, 2014 | past | 22 comments |
|
| | The Alternative History of Public-Key Cryptography (cryptome.org) |
| 1 point by lordbusiness on Sept 23, 2014 | past |
|
| | Are Google and Apple on Your Side [pdf] (cryptome.org) |
| 2 points by aburan28 on Sept 22, 2014 | past |
|
| | Top Secret .gov doc wanted everyone to “register” their encryption keys (1990s) [pdf] (cryptome.org) |
| 2 points by declan on Sept 19, 2014 | past |
|
| | “Giganews is an FBI Operation” (cryptome.org) |
| 150 points by bhaumik on Sept 15, 2014 | past | 67 comments |
|
| | Cryptanalysis of Vulcan [pdf] (cryptome.org) |
| 3 points by SworDsy on Sept 14, 2014 | past |
|
| | On Modeling the Costs of Censorship [pdf] (cryptome.org) |
| 1 point by aburan28 on Sept 13, 2014 | past |
|
| | Where Secrecy is Essential [pdf] (cryptome.org) |
| 2 points by aburan28 on Aug 22, 2014 | past |
|
| | Amazon Web Services: Overview of Security Processes (2013) [pdf] (cryptome.org) |
| 1 point by aburan28 on Aug 21, 2014 | past |
|
| | Memory Trace Oblivious Program Execution [pdf] (cryptome.org) |
| 4 points by aburan28 on Aug 9, 2014 | past |
|
| | Rethinking SSL Development in an Appified World [pdf] (cryptome.org) |
| 33 points by conductor on Aug 8, 2014 | past | 5 comments |
|
| | Command and Control: Understanding, Denying and Detecting [pdf] (cryptome.org) |
| 8 points by aburan28 on Aug 8, 2014 | past |
|
| | Should You Trust Tor? Not If Your Life Is At Stake [pdf] (cryptome.org) |
| 3 points by aburan28 on July 17, 2014 | past |
|
| | Towards a Unified Theory of Cryptographic Agents [pdf] (cryptome.org) |
| 2 points by aburan28 on June 23, 2014 | past |
|
|
| More |