In Hong Kong, Which Side Is Technology On?

Credit to Author: Zeynep Tufekci| Date: Tue, 22 Oct 2019 10:00:00 +0000
Both. Yes, authoritarians have co-opted tech. But the story is far from over.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Zeynep Tufekci| Date: Tue, 22 Oct 2019 10:00:00 +0000
Both. Yes, authoritarians have co-opted tech. But the story is far from over.
Read More
Credit to Author: Louise Matsakis| Date: Sat, 19 Oct 2019 11:00:00 +0000
Fried onion meets 1984.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 09 Oct 2019 18:32:07 +0000
Twitter funneled two-factor authentication phone numbers into their ad targeting platform—but they weren’t the only ones.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 09 Oct 2019 18:32:07 +0000
Twitter used phone numbers provided for two-factor authentication to target ads—just like Facebook did before.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 09 Oct 2019 11:00:00 +0000
The road to routing all Domain Name System lookups through HTTPS is pocked with disagreements over just how much it will help.
Read More
Credit to Author: Lily Hay Newman| Date: Thu, 03 Oct 2019 22:40:50 +0000
Attorney general William Barr seems eager to reignite the encryption wars, starting with the social media giant.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 02 Oct 2019 15:17:11 +0000
Turning on the new Incognito Mode in Google Maps won’t make you as invisible as it might sound.
Read More
Credit to Author: Andy Greenberg| Date: Wed, 02 Oct 2019 11:00:00 +0000
Researchers have found a potential silver lining in so-called adversarial examples, using it to shield sensitive data from snoops.
Read More