- COVID-19 Vaccine Passports Are Useless. (February 17, 2021)
- Universities need to Act, Digitally (We don’t need a Digital University Act). (January 10, 2021)
- To claim back power in the digital world, democracies need to make radical demands. (September 30, 2020)
- Google Apple Contact Tracing (GACT): a wolf in sheep's clothes. (April 19, 2020)
- A critical look at the EU approach to contact tracing apps (April 17, 2020)
- Stop the Apple and Google contact tracing platform. (Or be ready to ditch your smartphone.) (April 11, 2020)
- Should I cheat my exam? Defusing a modern prisoner's dilemma. (April 10, 2020)
- Review of 'Stand out of our light' by James Williams (March 26, 2019)
- Cash is king (March 20, 2019)
- Open access should be free for both authors and readers (January 30, 2019)
- On scarcity and the blockchain (October 25, 2018)
- Funding matters. Yet I am not signing this particular petition... (September 28, 2018)
- Lessons to be learned from the Polar incident (July 9, 2018)
- An unfortunate change in ENISA policy regarding authorship of reports. (January 31, 2018)
- Blockcerts: Using blokchain for identity management is (mostly) ridiculous (September 6, 2017)
- The challenges of privacy engineering (August 2, 2017)
- How Internet services erode society by depriving us from being helpful and feeling useful. (July 30, 2017)
- Laughing about the laws of mathematics does not win the crypto war. (July 17, 2017)
- Backup strategies against ransomware (May 14, 2017)
- Summary of the CPDP panel on algorithmic transparency (January 26, 2017)
- Summary of a panel on the Internet of Things @EDRi Privacy Camp (January 26, 2017)
- Shopping online 'naked'. When Google or Facebook get to access your bank account. (January 4, 2017)
- I've seen the future of smart living. And it was horrible. (October 19, 2016)
- Does 'Quantum encryption' defend against a quantum computer? (May 18, 2016)
- Who should have access to the data on our devices? (March 16, 2016)
- Note taking with the Apple Pencil (December 25, 2015)
- Short report of the “Protecting online privacy by enhancing IT security and strengthening EU IT capabilities” conference. (December 11, 2015)
- The second crypto war is not about crypto (December 8, 2015)
- EU policy recommendations to enhance privacy and strengthen security (December 7, 2015)
- The value of verifying public keys revisited. Or: how to limit the options for dragnet surveillance. (September 4, 2015)
- Is almost always secure nearly enough? (April 13, 2015)
- The way Signal is designed, it's really hard to like (and I really would like to!)... (March 4, 2015)
- The demise of society threatens our privacy (February 24, 2015)
- Using attribute based credentials for auditable access control (February 18, 2015)
- Why Peerby Works - And what we can learn from this to develop successful privacy friendly apps and services. (January 1, 2015)
- Is Apple's commitment to privacy just a cynical smokescreen or could it be for real? (November 3, 2014)
- Why you need anonymity to have privacy on the Internet. (October 20, 2014)
- It's the identity, stupid! Or: Google should stop whining, and start acting responsibly. (September 12, 2014)
- Facebook's eerie accuracy of guessing people I know. (August 25, 2014)
- PETs (Privacy Enhancing Technologies) post Snowden (July 18, 2014)
- Moglen's essay over privacy, surveillance en de democratie (May 28, 2014)
- Yet Another Google Case: The right to privacy versus the freedom of expression. (May 15, 2014)
- Everyday security - Apparently anything can be a payment terminal. (May 13, 2014)
- Heartbleed: the effects of irresponsible disclosure. (April 13, 2014)
- 10+ reasons why PGP sucks (November 6, 2013)
- The benefits of total surveillance? Only for those in power. (October 6, 2013)
- Can we save our online freedom? (August 30, 2013)
- Volkswagen vs. my colleagues: a fight for academic freedom (and against security by obscurity). (July 30, 2013)
- Whose security is this anyway? (June 19, 2013)
- Would you trust the janitor with all your keys? (June 17, 2013)
- Privacy by design only prevents unintended privacy infringements (June 7, 2013)
- Google is sending the perfect phishing email. (April 15, 2013)
- Pseudonymous data should not be exempted from data protection. (April 3, 2013)
- An eID should not be linked exclusively to an identity card. (February 8, 2013)
- Does a centralised eID service in the German eID system pose a privacy risk? (February 7, 2013)
- Open Access! - But How? (January 15, 2013)
- APC day #0: (The problem with) Contextual integrity. (October 7, 2012)
- Apple recovers iPhone data on behalf of law enforcement. Is this admissible evidence? (September 25, 2012)
- Don't build your business on consent. (September 14, 2012)
- The fuzzy mud puddle test: can your cloud storage provider access your encrypted data? (July 27, 2012)
- They will stop at nothing. (May 16, 2012)
- The new German eId card has security, privacy and usability limitations. (May 8, 2012)
- Analysing ADEPT (Adobe Digital Experience Protection Technology) (April 12, 2012)
- One Spotify to rule us all... (March 26, 2012)
- Privacy protection as enabling technology. (February 17, 2012)
- An unexpected privacy risk of anonymous credentials (February 14, 2012)
- On using identity cards to store anonymous credentials. (November 16, 2011)
- The Future of Authenticating Websites (FAWN) - 2 (October 24, 2011)
- Spamming the Internet of Things (October 17, 2011)
- On the moral basis for privacy protection. (October 16, 2011)
- The Future of Authenticating Websites (FAWN) - 1 (October 6, 2011)
- Traceable Anonymity and Revocable Privacy (June 24, 2011)
- Cookies beheren met... cookies! (June 12, 2011)
- Identity cards should not be used to store anonymous credentials (June 9, 2011)
- Privacy-by-default = no privacy by default? (March 22, 2011)
- Track-me-not: a comparison of recent browser-based solutions. (January 30, 2011)
- GSM Broken. Here's a quick fix. (January 3, 2011)
- GSM Broken. (December 28, 2010)
- The 1st European Data Protection and Privacy Conference 2010 (November 30, 2010)
- Should data loss be punished or not? (November 16, 2010)
- The problem with OpenID. (August 31, 2010)
- The Identity Crisis (4) - Security (April 6, 2010)
- Xmarks Smart Search invading privacy (March 3, 2010)
- The identity crisis (3) - Trust. (February 23, 2010)
- Google privacy - Report of a round table. (January 24, 2010)
- PwdHash (November 16, 2009)
- The Identity Crisis (1) - Membership vs Ownership (November 4, 2009)
- The user is not the weakest link (October 21, 2009)
- Revocable Privacy (November 21, 2008)
- The weakest link fallacy (January 30, 2008)