This article is part of the Free Speech Project, a collaboration between Future Tense and the Tech, Law, & Security Program at American University Washington College of Law that examines the ways ...
The Internet Society says perceptions around data encryption need to change in order to help build a stronger global digital economy. The organization, which aims to ensure the internet “stays open”, ...
Cloudflare’s 2025 Year in Review shows Internet traffic up 19%, post-quantum encryption protecting 52% of human traffic, and ...
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools ...
Australia's push to enact laws that would allow its law-enforcement agencies to compel companies help them break their own encryption represent an existential threat to the internet's security and ...
The National Security Agency has the keys to most Internet encryption methods and it has gotten them by using supercomputers to break them and by enlisting the help of private IT companies, The New ...
This is the big one: New documents released by Edward Snowden show that the NSA and its British equivalent, GCHQ (pictured above), have cracked VPNs, SSL, and TLS -- the encryption technologies that ...
Google, the most widely used Web browser in the world, thinks a majority of state and local government websites aren’t doing enough to protect the people visiting them. And starting in July, that ...
Internet-connected gadgets like light bulbs and fitness trackers are notorious for poor security. That's partly because they’re often made cheaply and with haste, which leads to careless mistakes and ...
Research presented at the Black Hat security conference in Las Vegas, Nevada, last week revealed that the Linux software used by the most widely used random-number generators does not spit out ...
When midnight strikes on Jan. 1, 2016, a new Internet security standard goes into effect. The cryptographic hashing algorithm that encrypts websites to help keep them secure will be updated. While ...
Decent people see tragedy and barbarism when viewing a terrorism attack. American politicians and intelligence officials see something else: opportunity. Bodies were still lying in the streets of ...