Crypto-Gram June 15, 2021In this issue: AIs and Fake Comments The Misaligned Incentives for Cloud Security Vulnerabilities in Weapons Systems from the by read by /episode/index/show/dhenage/id/19813253
Crypto-Gram May 15, 2021In this issue: When AIs Start Hacking Security Vulnerabilities in Cellebrite Ransomware Is Getting Ugly from the by read by /episode/index/show/dhenage/id/19481003
Crypto-Gram April 15, 2021In this issue: Illegal Content and the Blockchain Details of a Computer Banking Scam The FBI Is Now Securing Networks Without Their Owners’ Permission from the by read by /episode/index/show/dhenage/id/19461707
Crypto-Gram March 15, 2021In this issue: National Security Risks of Late-Stage Capitalism More on the Chinese Zero-Day Microsoft Exchange Hack from the by read by /episode/index/show/dhenage/id/18681536
Crypto-Gram February 15, 2021In this issue: Cell Phone Location Privacy Presidential Cybersecurity and Pelotons from the by read by /episode/index/show/dhenage/id/18276890
Crypto-Gram January 15, 2021In this issue: Mexican Drug Cartels with High-Tech Spyware US Schools Are Buying Cell Phone Unlocking Systems Eavesdropping on Phone Taps from Voice Assistants Russia’s SolarWinds Attack and Software Security from the by read by /episode/index/show/dhenage/id/17917136
Crypto-Gram December 15, 2020In this issue: Indistinguishability Obfuscation More on the Security of the 2020 US Election Undermining Democracy Should There Be Limits on Persuasive Technologies? from the by read by /episode/index/show/dhenage/id/17514245
Crypto-Gram November 15, 2020In this issue: The Security Failures of Online Exam Proctoring “Privacy Nutrition Labels” in Apple’s App Store Inrupt’s Solid Announcement from the by read by /episode/index/show/dhenage/id/17167673
Crypto-Gram October 15, 2020In this issue: Documented Death from a Ransomware Attack COVID-19 and Acedia Google Responds to Warrants for “About” Searches from the by read by /episode/index/show/dhenage/id/16809659
Crypto-Gram September 15, 2020In this issue: Copying a Key by Listening to It in Action Identifying People by Their Browsing Histories Cory Doctorow on The Age of Surveillance Capitalism US Postal Service Files Blockchain Voting Patent from the by read by /episode/index/show/dhenage/id/16379219
Crypto-Gram August 15, 2020In this issue: On the Twitter Hack Survey of Supply Chain Attacks from the by read by /episode/index/show/dhenage/id/15974162
Crypto-Gram July 15, 2020In this issue: Eavesdropping on Sound Using Variations in Light Bulbs Zoom Will Be End-to-End Encrypted for All Users COVID-19 Risks of Flying iPhone Apps Stealing Clipboard Data Securing the International IoT Supply Chain The Security Value of Inefficiency from the by read by /episode/index/show/dhenage/id/15516677
Crypto-Gram June 15, 2020In this issue: Bart Gellman on Snowden Zoom's Commitment to User Security Depends on Whether you Pay It or Not from the by read by /episode/index/show/dhenage/id/15359918
Crypto-Gram May 15, 2020In this issue: Automatic Instacart Bots Securing Internet Videoconferencing Apps: Zoom and Others Me on COVID-19 Contact Tracing Apps from the by read by /episode/index/show/dhenage/id/14763800
Crypto-Gram April 15, 2020In this issue: Work-from-Home Security Advice Emergency Surveillance During COVID-19 Crisis Security and Privacy Implications of Zoom Contact Tracing COVID-19 Infections via Smartphone Apps Ransomware Now Leaking Stolen Documents from the by read by /episode/index/show/dhenage/id/14421221
Crypto-Gram March 15, 2020In this issue: Policy vs. Technology Inrupt, Tim Berners-Lee's Solid, and Me Security of Health Information from the by read by /episode/index/show/dhenage/id/13922225
Crypto-Gram February 15, 2020In this issue: Critical Windows Vulnerability Discovered by NSA Modern Mass Surveillance: Identify, Correlate, Discriminate from the by read by /episode/index/show/dhenage/id/13512788
Crypto-Gram January 15, 2020In this issue: Artificial Personas and Public Discourse 5G Security from the by read by /episode/index/show/dhenage/id/13160843
Crypto-Gram December 15, 2019In this issue: Reforming CDA 230 Scaring People into Supporting Backdoors from the by read by /episode/index/show/dhenage/id/12726908
Crypto-Gram November 15, 2019In this issue: Calculating the Benefits of the Advanced Encryption Standard Former FBI General Counsel Jim Baker Chooses Encryption Over Backdoors Technology and Policymakers from the by read by /episode/index/show/dhenage/id/12383480
Crypto-Gram October 15, 2019In this issue: Russians Hack FBI Comms System On Chinese "Spy Trains" Supply-Chain Security and Trust from the by read by /episode/index/show/dhenage/id/11862869
Crypto-Gram September 15, 2019In this issue: Influence Operations Kill Chain The Myth of Consumer-Grade Security Massive iPhone Hack Targets Uyghurs When Biology Becomes Software from the by read by /episode/index/show/dhenage/id/11641934
Crypto-Gram August 15, 2019In this issue: Palantir's Surveillance Service for Law Enforcement Zoom Vulnerability Attorney General William Barr on Encryption Policy How Privacy Laws Hurt Defendants Brazilian Cell Phone Hack from the by read by /episode/index/show/dhenage/id/11317001
Crypto-Gram July 15, 2019In this issue: Data, Surveillance, and the AI Arms Race Fake News and Pandemics from the by read by /episode/index/show/dhenage/id/10873343
Crypto-Gram June 15, 2019In this issue: First American Financial Corp. Data Records Leak Fraudulent Academic Papers Chinese Military Wants to Develop Custom OS Computers and Video Surveillance from the by read by /episode/index/show/dhenage/id/10348334
Crypto-Gram May 15, 2019In this issue: China Spying on Undersea Internet Cables G7 Comes Out in Favor of Encryption Backdoors Defending Democracies Against Information Attacks Protecting Yourself from Identity Theft First Physical Retaliation for a Cyberattack Leaked NSA Hacking Tools from the by read by /episode/index/show/dhenage/id/10119177
Crypto-Gram April 15, 2019In this issue: CAs Reissue Over One Million Weak Certificates Zipcar Disruption First Look Media Shutting Down Access to Snowden NSA Archives Mail Fishing TajMahal Spyware New Version of Flame Malware Discovered from the by read by /episode/index/show/dhenage/id/9599756
Crypto-Gram February 15, 2019In this issue: Evaluating the GCHQ Exceptional Access Proposal Public-Interest Tech at the RSA Conference Blockchain and Trust from the by read by /episode/index/show/dhenage/id/8896388
Crypto-Gram January 15, 2019In this issue: New Attack Against Electrum Bitcoin Wallets Machine Learning to Detect Software Vulnerabilities Using a Fake Hand to Defeat Hand-Vein Biometrics from the by read by /episode/index/show/dhenage/id/8430725