Six Lines Archive
Posts from this year
- » Google's Quantum Computing Breakthrough
- » Trust, Truth, and Science
- » Standard Ebooks
- » Sharing Happiness for the Sake of Happiness
2018
- » Sasse's Thoughts on Deepfakes
- » Remembering the Past
- » Crying Wolf and Cyber Attacks
- » The Promise and Peril of Big Tech
- » Secret Meetings and Deepfakes
- » Book Review – Sapiens
- » The Cabinet Files
- » Bad Analogies for Network Neutrality
2017
- » On Objective Standards for Removing Confederate Monuments
- » Why Privacy Regulation Will Happen
- » Network Neutrality, Again
- » Misunderstanding Encryption
2016
- » Responding to Opinion-oriented Questions on Stack Exchange Sites
- » Perfect Security Doesn't Exist
- » Developments in Electronic Voting
- » Tim Cook Believes Privacy is a Civil Liberty
- » E-books and Physical Books
- » Science and Screen Time
- » Nuclear Threats are Still Threats
- » Encryption isn't Even a Luxury
- » Unfit Bits
- » Peyton Manning on Healthcare Privacy
2015
- » Lifelock's $100M Settlement
- » An Amendment for Privacy
- » Net of Insecurity
- » Home Address versus Email Address
- » Tim Cook Interview on NPR
- » Something We Might Lose
- » Tim Cook on Stephen Colbert
2014
- » Apple's Encryption “Announcement”
- » Should Pseudonyms be Protected?
- » On Our Supposedly Dystopian Future
- » The Internet with a Regulatory Face
- » Heartbleed
- » Simple Introduction to 1Password
- » Apple's SSL Failure
- » TED Radio Hour on Privacy
- » Point of Sale Terminals and Open Source Software
- » Security and Privacy in 2014
2013
- » Expectations and Education
- » Will Teaching People to Code Improve Privacy?
- » Book Review – Jim Henson
- » The Google Books Settlement and the NSA
- » Acquisti on Why Privacy Matters
- » XKCD on Privacy
- » We Need the Rest of the Story
- » Teaching Software Engineering Ethics
- » policies.txt
- » Encryption Alone Doesn't Protect Privacy
- » On Meeting with Foreign Leaders
- » Two Clever Approaches to Revealing Government Secrets
- » Ethical User Interface Design
2012
2011
- » EFF on Public Key Infrastructure
- » Code Signing Flaw in iOS
- » Software Security on Mac OS X
- » Cloud Computing Privacy
- » Adobe Flash Security
- » EFF Satisfied With Amazon Silk
- » Air Travel Absurdity
- » ▶ The Privacy Implications of Amazon’s Silk Browser
- » Paper-Based Violation of HIPAA
- » Barnes & Noble Purchasing Borders Customer Data
- » danah boyd on Teen Privacy
- » Joel Stein on Passwords
- » Google’s Page Speed Service
- » Banks as Groupon Competitors
- » Software Security Rating Systems
- » Liability and Software Security
- » A Detailed Guide to Creating Passwords
- » Communications Privacy in Tennessee
- » Best Practices for a Secure Cloud
- » The Continuing Saga of Dropbox
- » Pinboard vs. Urchin
- » Texas vs. the TSA
- » The “Nothing to Hide” Argument
- » Complaint to FTC about Dropbox
- » Why Privacy Mattered
- » Connecting the Dots
- » Smartphones and Social Networks
- » Facebook Apps Security Hole
- » Google Location Data Lawsuit
- » Creepy Location Tool
- » Apple Responds to Location Data Concerns
- » ▶ Apple and Location Data
- » Hard Drive Steganography
- » Relying on Regulation
- » Dilbert on Privacy
- » Schneier’s Law
- » Dropbox Encryption
- » Email and the Fourth Amendment
- » Asymmetry and Security
- » The Only Secure Password
- » Stuxnet TED Talk
- » HTTPS Tradeoffs
- » Obama Administration Backs Privacy Law
- » Facebook Logins and Job Interviews
- » Password Management
- » Security State of the Union
- » Location Privacy
- » Facebook and HTTPS
- » ▶ The Difference Between Cryptography and Security
- » Facebook Reconsiders Address and Mobile Number Sharing
- » Facebook Allows API Access to Phone Numbers and Addresses
2010
- » HTTPS Everywhere Updated for Firesheep
- » Data Mining for Life Insurance
- » Bruce Schneier on Reconceptualizing Security
- » The Ethics of Firesheep
- » Felten Named FTC Chief Technologist
- » Federal Cloud Computing Security Requirements
- » The Problems of Government Cryptographic Policy
- » Protection from Firesheep
- » Destroying the Indestructible Cookie
- » CNN Covers Voting Hacks
- » 280,000 Missing Medical Records
- » Firesheep
- » Apple Deprecates Java for Security?
- » FaceTime Security Hole
- » More Proposals for Wiretapping the Internet
- » Lower Merion Webcam Privacy Case Resolved
- » Intro to Smart Grid Privacy
- » Problems with Internet Voting
- » U.S. Customs and Border Protection
- » Supreme Court to Hear Employee Privacy Case
- » All About Stuxnet
- » Wiretapping the Internet
- » Indestructible Cookies
- » The Market for Credit Cards
- » The Inevitable Dislike Button
- » Rubin’s Privacy Fallacies
- » Stephen Colbert on Privacy
- » Internet Explorer Privacy
- » E-Books and Privacy
- » Cyberwar Rhetoric
- » ▶ Rush Introduces Privacy Bill
- » ECPA Reform Videos
- » Geolocation Privacy
- » Facebook and Protecting Children
- » Cyber Command Logo Challenge Disappointment
- » Schneier on Cyberwar Hype
- » Cyber Command Logo Challenge
- » NPR’s End of Privacy Series
- » Privacy and Celebrity
- » Point-Counterpoint: Hiring Hackers
- » Last Lakota Code Talker Dies
- » The Cyberwar Threat
- » Fifth Annual Movie Plot Threat Contest Winner
- » Permanent Deletion
- » Carl Malamud at Gov2.0
- » Opt-out for Google Analytics
- » One Nation Under CCTV No Longer?
- » The Government Cloud
- » Digital Copiers as Time-Bombs
- » Schneier’s Fifth Annual Movie Plot Threat Contest
- » Warrantless Wiretapping is Illegal
- » EFF Panel on Desigining Security and Privacy
- » Breaking SSL Encryption
- » The Cybersecurity Act
- » danah boyd on Chatroulette
- » Netflix Privacy Research
- » Open Government: The Privacy Imperative
- » Mac OS X Zero-Day Threats
- » Harper on Schumer and Graham
- » ▶ Introducing Six Lines
- » Another Horrible Plan for National Identification