It’s the ‘90s all over again, and the White House is in no mood to humor tech companies right now.
Habitually untrustworthy snoops still demand we trust them to monitor our communications.
After years of political fights over our privacy, a potential end in mass phone metadata collection
If the Feds Have Stopped Snooping on Our Phone Records, Watch Out for the Anti-Encryption Propaganda
Backdoors into your texts and private message provide far more information than your phone metadata.
Bombshell Report About Americans Helping UAE Hack Phones Is a Warning Against Compromising Encryption
Hacking tools end up in the hands of some dangerous people. So, apparently, do our government hackers.
Economists Kenneth Rogoff and Lawrence H. White face off over what the impact would be of a ban on cryptocurrency and phaseout of the $100 bill.
Australians who want to protect their data from surveillance now need to turn to extra-legal means.
Parliament passes a bill at the last possible moment to give officials the power to weaken encryption.
Facebook, Twitter, and other mainstream social networks have their issues. Are these 5 platforms viable alternatives?
Draft legislation would force tech companies to compromise encryption at the government's demand.
Reason's Elizabeth Nolan Brown on libertarian feminism, how to encrypt your email, and more
Law enforcement is upset, but data security is vital to prevent crimes.
We offer how-tos, personal stories, and guides for all kinds of activities that can and do happen right at the borders of legally permissible behavior.
Was their miscount of unlockable phones truly a mistake or part of an agenda?
"Privacy is not for sale, and human rights should not be compromised out of fear or greed."
The former FBI director recognizes his criticism of Apple was "thoughtless," but he doesn't see the underlying problem with seeking cybersecurity back doors.
The FBI is looking for a back door to your phone. So are some snoops in the FBI's back yard.
Report: FBI Officials Dragged Feet Breaking into Terrorist's Phone to Try to Force Apple to Weaken Encryption
A political battle following the San Bernardino attack was the result of an attempt to make a test case.
Public-key encryption has brought a drastic shift in power from the state to individuals.
Another possible standoff where officials want to compromise everybody's data security.
What Rosenstein wants would threaten data security. That's hardly responsible.
Amber Rudd admits that she doesn't understand encryption while insisting on the need to undermine it.
What happens when you think privacy and speech are just tools of the enemy
Government authorities refuse to consider uncontrollable, dangerous consequences of breaking data privacy.
A wave of new technologies is making it easier for us all to flip the bird to regulators and prohibitionists.
The British government uses its own intel failures to demand weakening of encryption.
Agency hoards infiltration tools and puts our information at risk of exposure.
When transparency and government corruption can come from the same mechanism.
Working on even stronger tech to protect from snooping.
He talks about data protection, but does he understand it at all?
A call for strong data protection even in the face of law enforcement demands.
A guide to stripping the political outrage out of a national defense and policy issue.
Nestled deep in the Investigatory Powers Bill is the authority to mandate encryption "back doors."
Whistleblower doesn't worry about whether there will be a deal for his return.
Amid debate over encryption access, feds try to just sneak right through.
Podesta leak acknowledges her 'instincts' are to accept law enforcement's claims on encryption access and surveillance.
Law criminalizes anything done in preparation for attack-including behavior that is normally legal.
Government officials arguing against privacy protections are learning their importance in the most embarrassing ways possible.
Who will actually be defining the agenda, because it won't be these two?
FBI refuses to publicly reveal security vulnerability.
Group lists safeguards governments should follow before hacking citizens.
Two words from a government official to dismiss decades of expertise on encryption.
Would she allow the rest of us to be equally protected?
How an oppressive Middle Eastern country led to everybody's iPhones getting a security update.