Home // About

opeds

Category
  • Should open source development platforms be a public utility? (February 24, 2025)
  • Bye Bye Big Tech (January 22, 2025)
  • Feedback on the consultation on the eID implementing regulations (September 5, 2024)
  • Cryptographers’ Feedback on the EU Identity Wallet (June 23, 2024)
  • Raisin, stop abetting identity theft. (April 4, 2024)
  • Will the digital euro really be equivalent to cash? (February 28, 2024)
  • Some observations on the final text of the European Digital Identity framework (eIDAS). (November 20, 2023)
  • Tainting the CSAM client-side scanning database. (October 11, 2023)
  • DDoS-ing client-side scanning (October 4, 2023)
  • Yet another OV-chipcard usability fail. (July 1, 2023)
  • Six suggestions to make international train travel more attractive (October 14, 2022)
  • Passkeys and eIDAS - the future of authentication. (September 12, 2022)
  • The European Declaration on Digital Rights puts people in the firing line of the digital transformation. (March 6, 2022)
  • Civil liberties aspects of the European Digital Identity Framework. (January 31, 2022)
  • Add friction to counter WhatsApp fraud (July 11, 2021)
  • The European Digital Identity framework (June 14, 2021)
  • Apple’s Private Relay. A first step towards Mixing for the Masses (June 8, 2021)
  • Readwise? Unwise! (May 12, 2021)
  • COVID-19 Vaccine Passports Are Useless. (February 17, 2021)
  • Universities need to Act, Digitally (We don’t need a Digital University Act). (January 10, 2021)
  • To claim back power in the digital world, democracies need to make radical demands. (September 30, 2020)
  • Google Apple Contact Tracing (GACT): a wolf in sheep's clothes. (April 19, 2020)
  • A critical look at the EU approach to contact tracing apps (April 17, 2020)
  • Stop the Apple and Google contact tracing platform. (Or be ready to ditch your smartphone.) (April 11, 2020)
  • Should I cheat my exam? Defusing a modern prisoner's dilemma. (April 10, 2020)
  • Review of 'Stand out of our light' by James Williams (March 26, 2019)
  • Cash is king (March 20, 2019)
  • Open access should be free for both authors and readers (January 30, 2019)
  • On scarcity and the blockchain (October 25, 2018)
  • Funding matters. Yet I am not signing this particular petition... (September 28, 2018)
  • Lessons to be learned from the Polar incident (July 9, 2018)
  • An unfortunate change in ENISA policy regarding authorship of reports. (January 31, 2018)
  • Blockcerts: Using blokchain for identity management is (mostly) ridiculous (September 6, 2017)
  • The challenges of privacy engineering (August 2, 2017)
  • How Internet services erode society by depriving us from being helpful and feeling useful. (July 30, 2017)
  • Laughing about the laws of mathematics does not win the crypto war. (July 17, 2017)
  • Backup strategies against ransomware (May 14, 2017)
  • Summary of a panel on the Internet of Things @EDRi Privacy Camp (January 26, 2017)
  • Summary of the CPDP panel on algorithmic transparency (January 26, 2017)
  • Shopping online 'naked'. When Google or Facebook get to access your bank account. (January 4, 2017)
  • I've seen the future of smart living. And it was horrible. (October 19, 2016)
  • Does 'Quantum encryption' defend against a quantum computer? (May 18, 2016)
  • Who should have access to the data on our devices? (March 16, 2016)
  • Note taking with the Apple Pencil (December 25, 2015)
  • Short report of the “Protecting online privacy by enhancing IT security and strengthening EU IT capabilities” conference. (December 11, 2015)
  • The second crypto war is not about crypto (December 8, 2015)
  • EU policy recommendations to enhance privacy and strengthen security (December 7, 2015)
  • The value of verifying public keys revisited. Or: how to limit the options for dragnet surveillance. (September 4, 2015)
  • Is almost always secure nearly enough? (April 13, 2015)
  • The way Signal is designed, it's really hard to like (and I really would like to!)... (March 4, 2015)
  • The demise of society threatens our privacy (February 24, 2015)
  • Using attribute based credentials for auditable access control (February 18, 2015)
  • Why Peerby Works - And what we can learn from this to develop successful privacy friendly apps and services. (January 1, 2015)
  • Is Apple's commitment to privacy just a cynical smokescreen or could it be for real? (November 3, 2014)
  • Why you need anonymity to have privacy on the Internet. (October 20, 2014)
  • It's the identity, stupid! Or: Google should stop whining, and start acting responsibly. (September 12, 2014)
  • Facebook's eerie accuracy of guessing people I know. (August 25, 2014)
  • PETs (Privacy Enhancing Technologies) post Snowden (July 18, 2014)
  • Moglen's essay over privacy, surveillance en de democratie (May 28, 2014)
  • Yet Another Google Case: The right to privacy versus the freedom of expression. (May 15, 2014)
  • Everyday security - Apparently anything can be a payment terminal. (May 13, 2014)
  • Heartbleed: the effects of irresponsible disclosure. (April 13, 2014)
  • 10+ reasons why PGP sucks (November 6, 2013)
  • The benefits of total surveillance? Only for those in power. (October 6, 2013)
  • Can we save our online freedom? (August 30, 2013)
  • Volkswagen vs. my colleagues: a fight for academic freedom (and against security by obscurity). (July 30, 2013)
  • Whose security is this anyway? (June 19, 2013)
  • Would you trust the janitor with all your keys? (June 17, 2013)
  • Privacy by design only prevents unintended privacy infringements (June 7, 2013)
  • Google is sending the perfect phishing email. (April 15, 2013)
  • Pseudonymous data should not be exempted from data protection. (April 3, 2013)
  • An eID should not be linked exclusively to an identity card. (February 8, 2013)
  • Does a centralised eID service in the German eID system pose a privacy risk? (February 7, 2013)
  • Open Access! - But How? (January 15, 2013)
  • APC day #0: (The problem with) Contextual integrity. (October 7, 2012)
  • Apple recovers iPhone data on behalf of law enforcement. Is this admissible evidence? (September 25, 2012)
  • Don't build your business on consent. (September 14, 2012)
  • The fuzzy mud puddle test: can your cloud storage provider access your encrypted data? (July 27, 2012)
  • They will stop at nothing. (May 16, 2012)
  • The new German eId card has security, privacy and usability limitations. (May 8, 2012)
  • Analysing ADEPT (Adobe Digital Experience Protection Technology) (April 12, 2012)
  • One Spotify to rule us all... (March 26, 2012)
  • Privacy protection as enabling technology. (February 17, 2012)
  • An unexpected privacy risk of anonymous credentials (February 14, 2012)
  • On using identity cards to store anonymous credentials. (November 16, 2011)
  • The Future of Authenticating Websites (FAWN) - 2 (October 24, 2011)
  • Spamming the Internet of Things (October 17, 2011)
  • On the moral basis for privacy protection. (October 16, 2011)
  • The Future of Authenticating Websites (FAWN) - 1 (October 6, 2011)
  • Traceable Anonymity and Revocable Privacy (June 24, 2011)
  • Cookies beheren met... cookies! (June 12, 2011)
  • Identity cards should not be used to store anonymous credentials (June 9, 2011)
  • Privacy-by-default = no privacy by default? (March 22, 2011)
  • Track-me-not: a comparison of recent browser-based solutions. (January 30, 2011)
  • GSM Broken. Here's a quick fix. (January 3, 2011)
  • GSM Broken. (December 28, 2010)
  • The 1st European Data Protection and Privacy Conference 2010 (November 30, 2010)
  • Should data loss be punished or not? (November 16, 2010)
  • The problem with OpenID. (August 31, 2010)
  • The Identity Crisis (4) - Security (April 6, 2010)
  • Xmarks Smart Search invading privacy (March 3, 2010)
  • The identity crisis (3) - Trust. (February 23, 2010)
  • Google privacy - Report of a round table. (January 24, 2010)
  • PwdHash (November 16, 2009)
  • The Identity Crisis (1) - Membership vs Ownership (November 4, 2009)
  • The user is not the weakest link (October 21, 2009)
  • Revocable Privacy (November 21, 2008)
  • The weakest link fallacy (January 30, 2008)

Search /// Archives /// Categories /// Tags /// RSS Feed /// Subscribe
Made with SSST.