- Feedback
on the consultation on the eID implementing regulations (September
5, 2024)
- Cryptographers’
Feedback on the EU Identity Wallet (June 23, 2024)
- Raisin,
stop abetting identity theft. (April 4, 2024)
- Will
the digital euro really be equivalent to cash? (February 28,
2024)
- Some
observations on the final text of the European Digital Identity
framework (eIDAS). (November 20, 2023)
- Tainting
the CSAM client-side scanning database. (October 11, 2023)
- DDoS-ing
client-side scanning (October 4, 2023)
- Yet
another OV-chipcard usability fail. (July 1, 2023)
- Six
suggestions to make international train travel more attractive
(October 14, 2022)
- Passkeys
and eIDAS - the future of authentication. (September 12, 2022)
- The
European Declaration on Digital Rights puts people in the firing line of
the digital transformation. (March 6, 2022)
- Civil
liberties aspects of the European Digital Identity Framework.
(January 31, 2022)
- Add
friction to counter WhatsApp fraud (July 11, 2021)
- The
European Digital Identity framework (June 14, 2021)
- Apple’s
Private Relay. A first step towards Mixing for the Masses (June 8,
2021)
- Readwise?
Unwise! (May 12, 2021)
- COVID-19
Vaccine Passports Are Useless. (February 17, 2021)
- Universities
need to Act, Digitally (We don’t need a Digital University Act).
(January 10, 2021)
- To
claim back power in the digital world, democracies need to make radical
demands. (September 30, 2020)
- Google
Apple Contact Tracing (GACT): a wolf in sheep's clothes. (April 19,
2020)
- A
critical look at the EU approach to contact tracing apps (April 17,
2020)
- Stop
the Apple and Google contact tracing platform. (Or be ready to ditch
your smartphone.) (April 11, 2020)
- Should
I cheat my exam? Defusing a modern prisoner's dilemma. (April 10,
2020)
- Review
of 'Stand out of our light' by James Williams (March 26, 2019)
- Cash is king
(March 20, 2019)
- Open
access should be free for both authors and readers (January 30,
2019)
- On
scarcity and the blockchain (October 25, 2018)
- Funding
matters. Yet I am not signing this particular petition... (September
28, 2018)
- Lessons
to be learned from the Polar incident (July 9, 2018)
- An
unfortunate change in ENISA policy regarding authorship of reports.
(January 31, 2018)
- Blockcerts:
Using blokchain for identity management is (mostly) ridiculous
(September 6, 2017)
- The
challenges of privacy engineering (August 2, 2017)
- How
Internet services erode society by depriving us from being helpful and
feeling useful. (July 30, 2017)
- Laughing
about the laws of mathematics does not win the crypto war. (July 17,
2017)
- Backup
strategies against ransomware (May 14, 2017)
- Summary
of a panel on the Internet of Things @EDRi Privacy Camp (January 26,
2017)
- Summary
of the CPDP panel on algorithmic transparency (January 26,
2017)
- Shopping
online 'naked'. When Google or Facebook get to access your bank
account. (January 4, 2017)
- I've
seen the future of smart living. And it was horrible. (October 19,
2016)
- Does
'Quantum encryption' defend against a quantum computer? (May 18,
2016)
- Who
should have access to the data on our devices? (March 16, 2016)
- Note
taking with the Apple Pencil (December 25, 2015)
- Short
report of the “Protecting online privacy by enhancing IT security and
strengthening EU IT capabilities” conference. (December 11,
2015)
- The
second crypto war is not about crypto (December 8, 2015)
- EU
policy recommendations to enhance privacy and strengthen security
(December 7, 2015)
- The
value of verifying public keys revisited. Or: how to limit the options
for dragnet surveillance. (September 4, 2015)
- Is
almost always secure nearly enough? (April 13, 2015)
- The
way Signal is designed, it's really hard to like (and I really would
like to!)... (March 4, 2015)
- The
demise of society threatens our privacy (February 24, 2015)
- Using
attribute based credentials for auditable access control (February
18, 2015)
- Why
Peerby Works - And what we can learn from this to develop successful
privacy friendly apps and services. (January 1, 2015)
- Is
Apple's commitment to privacy just a cynical smokescreen or could it be
for real? (November 3, 2014)
- Why
you need anonymity to have privacy on the Internet. (October 20,
2014)
- It's
the identity, stupid! Or: Google should stop whining, and start acting
responsibly. (September 12, 2014)
- Facebook's
eerie accuracy of guessing people I know. (August 25, 2014)
- PETs
(Privacy Enhancing Technologies) post Snowden (July 18, 2014)
- Moglen's
essay over privacy, surveillance en de democratie (May 28,
2014)
- Yet
Another Google Case: The right to privacy versus the freedom of
expression. (May 15, 2014)
- Everyday
security - Apparently anything can be a payment terminal. (May 13,
2014)
- Heartbleed:
the effects of irresponsible disclosure. (April 13, 2014)
- 10+
reasons why PGP sucks (November 6, 2013)
- The
benefits of total surveillance? Only for those in power. (October 6,
2013)
- Can we
save our online freedom? (August 30, 2013)
- Volkswagen
vs. my colleagues: a fight for academic freedom (and against security by
obscurity). (July 30, 2013)
- Whose
security is this anyway? (June 19, 2013)
- Would
you trust the janitor with all your keys? (June 17, 2013)
- Privacy
by design only prevents unintended privacy infringements (June 7,
2013)
- Google
is sending the perfect phishing email. (April 15, 2013)
- Pseudonymous
data should not be exempted from data protection. (April 3,
2013)
- An
eID should not be linked exclusively to an identity card. (February
8, 2013)
- Does
a centralised eID service in the German eID system pose a privacy
risk? (February 7, 2013)
- Open
Access! - But How? (January 15, 2013)
- APC
day #0: (The problem with) Contextual integrity. (October 7,
2012)
- Apple
recovers iPhone data on behalf of law enforcement. Is this admissible
evidence? (September 25, 2012)
- Don't
build your business on consent. (September 14, 2012)
- The
fuzzy mud puddle test: can your cloud storage provider access your
encrypted data? (July 27, 2012)
- They
will stop at nothing. (May 16, 2012)
- The
new German eId card has security, privacy and usability limitations.
(May 8, 2012)
- Analysing
ADEPT (Adobe Digital Experience Protection Technology) (April 12,
2012)
- One
Spotify to rule us all... (March 26, 2012)
- Privacy
protection as enabling technology. (February 17, 2012)
- An
unexpected privacy risk of anonymous credentials (February 14,
2012)
- On
using identity cards to store anonymous credentials. (November 16,
2011)
- The
Future of Authenticating Websites (FAWN) - 2 (October 24, 2011)
- Spamming
the Internet of Things (October 17, 2011)
- On
the moral basis for privacy protection. (October 16, 2011)
- The
Future of Authenticating Websites (FAWN) - 1 (October 6, 2011)
- Traceable
Anonymity and Revocable Privacy (June 24, 2011)
- Cookies
beheren met... cookies! (June 12, 2011)
- Identity
cards should not be used to store anonymous credentials (June 9,
2011)
- Privacy-by-default
= no privacy by default? (March 22, 2011)
- Track-me-not:
a comparison of recent browser-based solutions. (January 30,
2011)
- GSM
Broken. Here's a quick fix. (January 3, 2011)
- GSM Broken.
(December 28, 2010)
- The
1st European Data Protection and Privacy Conference 2010 (November
30, 2010)
- Should
data loss be punished or not? (November 16, 2010)
- The
problem with OpenID. (August 31, 2010)
- The
Identity Crisis (4) - Security (April 6, 2010)
- Xmarks
Smart Search invading privacy (March 3, 2010)
- The
identity crisis (3) - Trust. (February 23, 2010)
- Google
privacy - Report of a round table. (January 24, 2010)
- PwdHash (November
16, 2009)
- The
Identity Crisis (1) - Membership vs Ownership (November 4,
2009)
- The
user is not the weakest link (October 21, 2009)
- Revocable
Privacy (November 21, 2008)
- The
weakest link fallacy (January 30, 2008)