From the German Interior and FBI-NY lawful access proposals to the prospect of meaningful IT privacy for all.

Five years after Snowden, although unbreakable end-to-end encryption is widely available, all or nearly all IT devices and systems remain remotely and continuously exploitable by

Read More »