2024-08-26 |
Is Telegram really an encrypted messaging app? |
messaging ‧ Matthew Green |
|
2024-04-17 |
A quick post on Chen’s algorithm |
academics ‧ Matthew Green |
|
2024-04-17 |
Attack of the week: Airdrop tracing |
Apple ‧ Matthew Green |
|
2024-04-17 |
To Schnorr and beyond (part 2) |
fundamentals ‧ Matthew Green |
|
2024-04-17 |
To Schnorr and beyond (Part 1) |
fundamentals ‧ Matthew Green |
|
2024-04-17 |
Some rough impressions of Worldcoin |
cryptocurrency ‧ Matthew Green |
|
2024-04-17 |
On Ashton Kutcher and Secure Multi-Party Computation |
academics ‧ Matthew Green |
|
2024-04-17 |
PRFs, PRPs and other fantastic things |
fundamentals ‧ Matthew Green |
|
2024-04-17 |
Book Review: Red Team Blues |
book reviews ‧ Matthew Green |
|
2024-04-17 |
Remarks on “Chat Control” |
backdoors ‧ Matthew Green |
|
2024-04-17 |
Why encrypted backup is so important |
Apple ‧ Matthew Green |
|
2024-04-17 |
A quick post on Chen’s algorithm |
academics ‧ Matthew Green |
|
2023-08-22 |
Some rough impressions of Worldcoin |
cryptocurrency ‧ Matthew Green |
|
2023-05-11 |
On Ashton Kutcher and Secure Multi-Party Computation |
academics ‧ Matthew Green |
|
2023-05-08 |
PRFs, PRPs and other fantastic things |
fundamentals ‧ Matthew Green |
|
2023-04-25 |
Book Review: Red Team Blues |
book reviews ‧ Matthew Green |
|
2023-03-23 |
Remarks on “Chat Control” |
backdoors ‧ Matthew Green |
|
2022-12-08 |
Why encrypted backup is so important |
Apple ‧ Matthew Green |
|
2022-10-28 |
One-Time Programs |
ransomware ‧ Matthew Green |
|
2022-06-10 |
In defense of crypto(currency) |
Bitcoin ‧ Matthew Green |
|
2022-01-14 |
An extremely casual code review of MetaMask’s crypto |
metamask ‧ Matthew Green |
|
2021-08-02 |
Thinking about “traceability” |
backdoors ‧ Matthew Green |
|
2021-08-02 |
Thinking about “traceability” |
backdoors ‧ Matthew Green |
|
2021-07-21 |
A case against security nihilism |
Apple ‧ Matthew Green |
|
2021-03-25 |
Why the FBI can’t get your browsing history from Apple iCloud (and other scary stories) |
Apple ‧ Matthew Green |
|
2020-11-17 |
Ok Google: please publish your DKIM secret keys |
email ‧ Matthew Green |
|
2020-08-12 |
Attack of the week: Voice calls in LTE |
attacks ‧ Matthew Green |
|
2020-07-13 |
Why is Signal asking users to set a PIN, or “A few thoughts on Secure Value Recovery” |
messaging ‧ Matthew Green |
|
2020-04-03 |
Does Zoom use end-to-end encryption? |
messaging ‧ Matthew Green |
|
2020-03-07 |
EARN IT is a direct attack on end-to-end encryption |
backdoors ‧ Matthew Green |
|
2020-01-06 |
What is the random oracle model and why should you care? (Part 5) |
fundamentals ‧ Matthew Green |
|
2019-12-09 |
Can end-to-end encrypted systems detect child sexual abuse imagery? |
backdoors ‧ Matthew Green |
|
2019-10-14 |
How safe is Apple’s Safe Browsing? |
Apple ‧ Matthew Green |
|
2019-09-25 |
Looking back at the Snowden revelations |
Uncategorized ‧ Matthew Green |
|
2019-06-06 |
How does Apple (privately) find your offline devices? |
Apple ‧ Matthew Green |
|
2019-05-08 |
Attack of the week: searchable encryption and the ever-expanding leakage function |
attacks ‧ Matthew Green |
|
2019-05-08 |
On Ghost Users and Messaging Backdoors |
Uncategorized ‧ Matthew Green |
|
2019-05-08 |
Let’s Talk about PAKE (2018) |
ctoth |
|
2019-05-08 |
Why I’m done with Chrome |
Google ‧ Matthew Green |
|
2019-05-08 |
Friday Dachshund Blogging |
Uncategorized ‧ Matthew Green |
|
2019-05-08 |
Wonk post: chosen ciphertext security in public-key encryption (Part 2) |
Uncategorized ‧ Matthew Green |
|
2019-05-08 |
Was the Efail disclosure horribly screwed up? |
attacks ‧ Matthew Green |
|
2019-05-08 |
A few thoughts on Ray Ozzie’s “Clear” Proposal (2018) |
gballan |
|
2019-05-08 |
Wonk post: chosen ciphertext security in public-key encryption (Part 1) |
Uncategorized ‧ Matthew Green |
|
2019-05-08 |
Hash-based Signatures: An illustrated Primer |
|
|